0 ratings0% found this document useful (0 votes) 79 views14 pagesINS Assignment 3
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here.
Available Formats
Download as PDF or read online on Scribd
Assignment =3, 7
"Vlo 93
Delle —Lvleud a a ~
) Defin der? VExploin ly .
‘ c
> Dn “ldo, ) an individhed oy oi jp
ains.UnatThorteed_aeceys._ a Q_ syst ity th
oy physical loadin «They. iS km, netiuark,
L We__mali ee,
ents suchas steating re clo
Ive
) cautsiiny clamage or cig tive inf nlomshan,
i
AS uDhing
There ovte_velHnuy cpl oer af
a So >
“Hack Ng “These, individuals use ilk
exploit vu fees oc eae
peli. ny ¢_mativeded by tinoneial gain,
Tideoleyy “ox eid on i ae |
—
1) Malware $= Fnliciqus coflwaye including viv use I
____worms,“hojans,.6 van can itil y
systems cause —hevmn_twithoud. Hunan _int
) Tnsideys Ereplayee.s ov individual ith
access ‘ o_System _who_rmisuise thei porilepen 1
wapnsts ,suth ag dad thet 19)
oY sabslage. \
4) Phighers 3 They use decepliye ena uiebsitt
“Compaen me: hos to + ssi_ oe aking mele fipns hes
— offen troupes ches |
SPyyvesonedion.
——8 Scape hala ge iat le e
we _qrre-wsritien seviphs 0x tusks 1
Set Hock without on in-depth unde,
a Siok = Sponsored Lebo Govewnnnrd ove regan
ie at cond uct ci hen—ee pishage Cybern
eu - teysort using”. lags
& 4 cchniguen ty achiev their Goals.
Q.2) Whol ig Fivewoll & evyphin He limitotiony «
Ano. A Fivewol) is 0 nelwork security device
on softwore thet ache os 0 borriew bebyiee
o_ trusted —inteunal network bs untrusted exten]
networks, such ag the incdeneh. Ts virnant
;
besten ig to monitor 4 control inconning tb
| Fi sdb behishe
eal ncules ecuritu Dolicien. Crewolle ae
designed to enhance nel udoyk security bu Ailing
b blocking materially haymful or Ginauthor
dala igautele Heue Gore sone limitations ctf a
i) aan, Deskin Dovid pMohwawer Eirewslle Ose
[ + tect one any eve noglwyre_
JNO a
com entering a1 aie try auth ema}] abtachendae downlonel. “They primarily es as
a a Sackbyess
Bie Mefense Against Tsicley Thrads= Firewalls any
inedlective oS addeessing shreds ora inating bom
oie dhe trusted nehdbyk such os Malicines
sites swith airthiniced sccen
gL yo Secuwe Enevupled Batic & Fivewnlls |
can ingle +e __ingpec} encrypted tyofhic rm |
op they chnmat cosily’ deciphey “He conbend }
¥ annec How) o Deep Macks E inspechon a
is requicedl tea elfccrive anolyte al-_encrysted
taLhich qnen Reus He bade funchons ale i
Aroditonel fixtwalls. S
A) _Compky — Annlicerion Layer Thoeaks &- Modern attack
often Jesgel_yulneva bi iltien od the cxpmlicarhioy
While fixewalls offey Som amplicon lowes ‘a
TiMwing they _moy not be capobl: of idles ne
backing atloniat! app licabion - specie _dineak Vahl,
3) False Positives Engel Fivewolls moa gencurde false
itive. alse negative clue 4p “the compl ity
ining bm maltdainging tihtering xulea.
ORY of foilue = Ththe fivewall itself is compan
ee. it can hove Seveve ConSeyuencea
: Jel on fi Nl
jie— 8.8 Faplain Dhighin —odlack with exarnple
Avy. Dhisting is, ilo of Cubes ack ix
which “ ollackens impersonate Lu i
to deceive individuals indo ve ectling sengif.
infor mrcctior i i ing
eluils jor easonal fla, |
Hee is an example of phi hing odtock =
“Tmogine you receive an emai) thet AMP ears
dn be ork your bank & it includes) fe
banks lou rmattints The ernai) nfo nan
you thet there has bebn suspieigun ocHivily
on—yourr accourt 6 uroes You tp click o
link vewifu uous atcount ~ detail to Secuae if
She link gyrevidd Kes yori tea wehst
that also looks like your banks official gfe
However, this website is a cleven limifalon
Creorted by dhe adfockesu, When voy entey_uour
Useuname b- Gasswosd ithe inbox mation: corphutal
bu attackers, who Can shen -acceys Your ‘real
bonk occount. This is a chesle exeMple ol
o Phishing odtack , whete the olacken
ipmensond’n a rusted Source do tyick You
indo divulging ensitive infor modion.
“To protect uoursel® Jom hishing cdldacla,
poly
vewify dhe cuban of ermails 6 websita, & civord
clicking on Susmiciou§ links or shanin pensonal
inforrmadn unkss you oe. certain ofp their itm.staph cidenend types of ‘Das
MOS (menial of Sd tice) Lacks, aac 7 us
~atlempls_to_disrupl disnhie athens e
—anclning “of alo coxa. hr ‘oxeal
_-seuice Thisie —asie_sevewnl -tpen of Dos alfack = >
y Smurf Attack ¢- AvackexS sence! TCMP echo
meguest ty a nelunrk broadcast add-vreg ;
with Vi i in I i :
on the EEA “p_respondl fp the victim pede nbialy.
ves loacliney it | »
2 Srrows ent Redixechion= This _ hoppens when Yo.
one “Hp ing chrying cto a a swhipage Howeves
oncthen cpavle with a_Aebhesend apens ae can
view only” epee a “unable fo
view clhe covdends af the ‘orginal po eo. This is hecawe
cig attacker has vedivecked” tae Sv igin al page
doo did fester page 2 a
9 Clogin ons 3= losin connection
the con _be_ ho Communicadion elween the
Sener _& dhe weceiver . “The aHtackesis Close
che open connection O qrevewt the user Hronn
accessing nresourcel
wel “cpp icoth m1
—tinally cxashen. Tn this cose che uses ig unable ce ged
access do the webpogt: :Wa
aut
Aeordrop Diack = -filachens _cend TP _goclek + J TP rapcked
: ra _, Lraam Saulooedlan 40 or:
ihe when + otbrntrh sD aE
* Syst
| onetoS oe dhenas
0) HTP Flood t= PHuckens Pind o weh cevven
with o massive numben “af HTTP wegue st. T
u Causing ceannice
Aissuplint
8.8) Evoloin Secure elecdaonic -trangociion.
Secure Electinnic_ Ronsachan or SET 1 ot
gystem thet ensuxey tho secuniht b inckerity
.. ii \. , i Re
Vv in
cords in a Scenosig «SET i ea ead
cthot ena blen Spoyeneed bik it o Secus ity
—___rctoeal opplied “4 4
dibhesievc} enc wumtion hos bing vec inigyth ii
strerougls credit costd » be SET mxctoco! web
in de by mator Cneqewnizaties
like Vise , Mastercard pet Michosof uy hiol ,
ded its Secure “Froneachion ‘Te
Wicle
Secuse aecket lotyeat
SF Grotocal nostaicds the mreverling f
"St n
jp mexchowdh thus keting
4h thieven a The srr att
hockens
includen Coshurerdion — Au ante for_making
- iae _X. 804
Cn
ZA
~_use of _standasiel ‘Digited Cesctificade ke
Hchicee
cule soi tal 53 Seve
Here's how SET _Works*—
) Pasi cipard Roles = Thene vie sthyee_main Poahic pends
in a ST 4yansaction , the cardholder, te
f merchant J Payment _arteway
» Digital Cestificcdes & Each pedficipart is issued a
gital_ceomlikicate which Contaisn their public key
Ceortiticote Rutho widen at.
2) Focyption AN Communitahion belween the position
X = A OM
\ D PYOtT
eoveschrnmping oe Lanopesiing,
4) Dink Stonafuse s= Digital Sionodusen ase used fo
S dhe inser enticity of the
ria = j dl indented eet
Durer involven _gevey
ite aa co id execudion on
a talc sysitm rn ire ig_—an nuptial
U
m7 On "htenya Creoclion b Catling Yn Ibis indial—ge the |
virus is _cntded_by a male Is 9 cece
_hockew —warile lh Virus, |
pA hich: ee Vaaious unclians 6 Say! 1s.
4 cious ations,
Such_as__ Spreading mechanism b mali
2) Dropanadion 2 Viruses need a means of spreadin
“Pantpngian he gyedems . They can clo “thy
Simaugh various methods Such as email
aHoahments , infected files, Network shaves ox
infected websites.
g x Oni i i a
Sea i+ cxecude cade, This can
Wwe i ixw’s
design. game commen actigns include replicating
elf, modifving or damaging Piles & compe
omising the sect b privady “of the infeckd sytem
4) Payload Activation 2 Many VWruses hove a soy
sant is_-he malicious achon they axe
a, ® U a |
de ‘ned a er cy a could he an th ng
1 |
Di Shabded ‘enal of oi gee erttack axe encrpe
sing Jgles for yancsam
{
5) Dekchn fb Removal As securridy meas wi |
ivi hen CoWare
elfmrt+ tn fe b remove virugen allan cea
©. Idewttten a virus i} f
delete he i ded Jileo ees at>
if rang fe op
ES Myuses” atiediscondinued by ei
one while then exsist fox_extended Tepiccl,
ry Discuss GS) Hondshnking qaaincal in dlefoil.
Aw SSI (Secure Sockets foyer) Handshake poshcol,
which has beh ouceeded Bu TLS (Transport loyen
Security) js a crucial “part of estubliching
Secure encrypted conneccHowl belween ci chet ard a
Qeuvew oven the ane
Here's i ceplniien of the SsLITLS handshake
Onatoeals
S Cienk Hello ‘The cliend initiates the handshak:
by nding a“ Cliew! Hello” messane
eves, This Smessane inchileg the clier*hs Supmated
ceyping scp alge¥ithme a random value di ethey
Porumelsis, Tt dlso specifier the higheat “F1S_veusisy.
2) Senven Hellat “The Seuver eepand uth aa_“Souves
He re meg ane’, “Ln thi message sther _seavest
choose the chron mulually suppavted —eiphest
suite 0 rondom value & confiymn the TLS version bbe
used.
code ty th cliew! This cesrhihicade she ludes the senvey
Public ey. ‘iAY. Searven Key Exchange te Spon “rey Soe.
m Seaver mar -send, addtional) Me rch,
oe einkormodion ov pervade,
a Seaver Hello Done t= "ae Craven ce
“Servant Hellobone” neg ange as
c_senver_tns corayleded ihe pose
Cote hentia niiamaiion
8) Finished = “the Sewven_sends a “fi
a i message whichis _a hoch sf all
—_—_hondshake Message jt has vereiveds Thic_gllow Mew |
the client o__vesttiy dhe hondrake irdecgity _|
The 5 his hondshake qretneal 6 Sundamerdal |
fy secusniy ting aptlng = 7 cain Leccvn ys
SD He conbiderdialtty ig ay
ev.chonged over dhe j ip Wile .
38) Waite _ghort note on PGP, ”
Av. eg ae cba (PGP) isa widely used
try hee
PGP was spinal develo by Phil Zinn |
e719 4 AS a" meapange bY conrenny
=f ee
2 ee in th ety
eee v9e) 0 fom ok_sueel 4
leo
&'
| Keu_Fecchuyes =
ZI ____——!
Fy Dablic iv " = PEP uses_a_pair_of ‘Keys, —
‘o Dublic Key fo enevuption an shy
foy_decruption + The_gublic key can he hated —
while “the " aprivade Key must be kept senha a
3 End-ty-fnd_Enex pian & Pat enabler endtoend
oe enowelin ensytity hat only the inden, d_vecipiod
d_sthe
con dtc and message ox clef,
9 Doital Sionaive + DEP allwe users to giqn heir
1 seen ae s wih thei pote Aa
in) wou exify the authenticity of the senden
orl the irdegaiy’ ‘af the contend,
4) Web of Frust® PGP emplous a “web of trust” model
whee users _cun_sign each, crthest keys, eclablishing a
nehuesk af trusted vreledionghip within oa _compsunity
3 OpenPGP landed = TGP hos evalved irc on open
7 Stondaud Known 48 _Open'PGP_, enguding suerpesia b—,
‘lity omang vasios PGP compatible Dhan and
inogtle mertetHond
Fa
8 Secuve Communicodion &- PGP ig _commanl used fox
| sectusting email communicedion by h
‘ i
jormg oF dada.
Poh telOD Eyploin Man -in= middle crltock 9 i
dw. A” Man-in-middle attack iS “a S¥rm ft —
intercept ond pos ibly a ters the communiced
bettie wo _centien, oFlen withoul dheiy
knowledge or nes Tao MTTM ark "i
cthe ackey positions themegelves belween
the iva leqitimoke _uvties. acting asa “ha
Cubexad tack in which an_ottackey sentiyy
mn
in_dhe—conttanicction » allowing Ahern do eaverdyo,
Tonipulode_, o even inypercohed the podrhien
invelved
Here» how! on MitM attack: workst
a"
b Tea ception & “The ache ints cept I
Communication behween she victim i i {
indender| secupient
2) Decryplions TF enexuption’ is in use the
ottac Kew right ottermpt do deer ape sthe
inctesrcemled Y derfa , exposing its ident,
3) Eaves doppi t= The cdlackey can silerdly
monitor commun tcedion, collecting -
information like tgin creclevdial Pasi di
or _confirlendial Messagen sO
4) Hala eo Th Some = the Hacker
This Aa involve roieelint alias contend,
changing tne recipients” adthieas or mad ing
f
kc E(faa cen ab Sma So Gace fH
aia
| Teepesisenedion & “The _cldackes sh imp oN
fear ante hg a ee
ion sentially easing pun io
eine al : 1D. ANUTNON TZ Pa
aki eae |
Common methods used in MitM ottack ineluder
> ARP Poisoning ¢ Tina local Helwork sock ens
pam can minimulate the Ackhress ‘Resolution a
DVeolocol cache Aclizecting cbaffic thvough heir
systems
ONS epooting $= ts dampeing with Domain Name 7
System © CONS) wesponfes, critackevs can _vediveed
ugeHs +o malicious website.
J!
pasyreye fet
) J
=
—* Wii Envescsopping 2- PHackeys can sel up aque
wi-fi hotspots, ewhicing users to connec
do _cthem_,_ & dhen {nese ging their haf fie.
O15 Explain 7 the Jb Low ing eum
J VRAPD OOR
Ny) Trapdoor inthe _cante + of computer ac fence
cayptoy rap gin a specific design
Kets Or Fae vail in__a_syctem thot
allows authorized users to _gexovm cesta ;“or ncceas _apecific. infor mahian ~
Haile parted unawihonzed users Prom
‘the sume. This__-levm is often ue)
ine contest of cryqto gacaphic cyclers,
secs Like ube __ hes ar where a
© trond oor fun chi
; chi dodo,
in such a_taoy Jali it, "noni be eles
ecrymed__by comeone with knowledge of '
Ske
\_ ROOTKIT
Anu, A Rootkit is oO Ju pe of malicious
enftumre thot “is fqned dn gal unauth
mized access and control Avex ‘a computer
or a computing system, often oct the
deemest level of she orperaching System
Rookki | u inal
dp hide thei” ‘Dr esence on “an infeed
ayetem . enabling therm dn Cox out vaso
malicious —_achitlien without being dete