Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
103 views54 pages

Cyber Security Challenges - How To Deal With It

The document provides an overview of password security and common password attacks. It discusses types of password attacks like brute force attacks, dictionary attacks, keylogger attacks, phishing attacks, and social engineering attacks. The goal of password security is to restrict unauthorized access, but cybercriminals use various techniques to try to gain access without consent, such as tracking keystrokes, tricking users into providing login credentials, or manipulating people into willingly revealing sensitive information. Overall, the document outlines common methods hackers use to breach password security and access protected systems and information.

Uploaded by

Lawrence Lau
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
103 views54 pages

Cyber Security Challenges - How To Deal With It

The document provides an overview of password security and common password attacks. It discusses types of password attacks like brute force attacks, dictionary attacks, keylogger attacks, phishing attacks, and social engineering attacks. The goal of password security is to restrict unauthorized access, but cybercriminals use various techniques to try to gain access without consent, such as tracking keystrokes, tricking users into providing login credentials, or manipulating people into willingly revealing sensitive information. Overall, the document outlines common methods hackers use to breach password security and access protected systems and information.

Uploaded by

Lawrence Lau
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 54

Table of Contents

Introduction......................................................................................................................................... 01

Chapter 1

Password security...............................................................................................................................03

Chapter 2

Social Engineering.............................................................................................................................13

Chapter 3

Simple safety tips for securing your email account.............................................................21

Chapter 4

Practical safety tips when using public Wi-Fi networks......................................................27

Chapter 5

Top tips for securing your mobile devices.............................................................................33

Chapter 6

Common cyber attacks and preventions.................................................................................38

Chapter 7

Notable cyber attack cases..............................................................................................................46

Conclusion....................................................................................................................................50
Introduction
In a report from Cybersecurity Ventures, it is estimated that by 2021,
cyber crime will exceed 3.5 million worldwide. This is a disturbing news
considering the potential havoc that will be wrecked by such a huge figure
of cyber crime.

For instance, damage costs from global ransomware are expected to


exceed $5 billion from $325 million in the last two years. It is as a result
of this disturbing reality that IBM’s president and CEO, Ginni Rometty said
that “Cyber crime is the greatest threat to every company in the world.”
The statistics show that the CEO was right.

If cyber crime continues its ascent at this alarming rate, the whole world,
including people and other inanimate things may become victims of cyber
crime. That will be a huge challenge.

What can we do to stem this tide and prevent this cyber holocaust? Should
we just fold our arms and expect the technology gurus come up with
counter software or technology?

Well, that can’t be ruled out. But in the meantime, the proposal of
Cybersecurity Jobs Report, 2017 will drastically reduce the rate at which
we are susceptible to cyber attacks and other crimes. The report suggested
that “Every IT worker, every technology worker, needs to be involved with
protecting and defending apps, data, devices, infrastructure, and people.”
That’s fine.

However, I would like to add that every person who owns and uses a
computer and the Internet should be involved in this collective fight against
cyber attacks. That includes you.

What can you do to contribute your own little quota to the security of the
world against the dreaded cyber attack? What steps can you take to fortify
yourself against such attacks?

01
This eBook will provide satisfying answers to your numerous questions
on cybersecurity so that you can personally handle your cybersecurity
challenges and help the world to overcome the epidemic.

In this book, I will touch on some salient issues such as:

●● Password security.

●● Social engineering.

●● How to secure your email account?

●● How to maintain your safety when using public Wi-Fi networks?

●● How to secure your mobile devices?

●● Preventive measures against some common cyber attacks.

When you are through with reading this book, it is my candid opinion that
you would have learned some tips that can reduce your vulnerability to
cyber attacks.

What are you waiting for? Flip to the next page and let me take you on a
ride. I promise you, you won’t regret going on this adventure.

Best Regards,
Wilson Wong
Managing Director
Condition Zebra

02
Chapter 1
Password security

03
Password security or protection is a security measure that is used for
protecting any information that is accessible from computers from
unauthorized personnel. The goal is to restrict any authorized person
from having access to the system with a view to ensure the security of the
information and reduce its susceptibility to alteration or misuse.

In essence, when you password protect a computer system, anybody


without a knowledge of your password will not have access to that system.
This is the first step towards IT security because it is the first form of
defense against both internal and external intruders that may have the goal
of attacking the system via the Internet.

However, that doesn’t imply that some cybercriminals won’t attempt to find
a way to gain access to your system without your consent and harm you.
No, they are not content to resigning to their fate. You will still be attacked.
How?

Types of password attacks


Despite your best efforts at providing adequate security for your
computer system and the valuable information safely kept in it, hardened
cybercriminals will make an attempt at breaching your security by using
any of these techniques:

1. Brute force
This is the most notorious and one of the most successful password attack
techniques. A hacker that is hell bent on having his or her way will use a
computer script or program to try to gain access to your computer by using
a combination of passwords. The hacker will launch his first attacks on
simple and easy-to guess passwords.

If that doesn’t work, he progresses to more difficult passwords by trying


all the possible alpha-numeric password combinations, starting with aaa1

04
and working through to zzz10. Think about this, if you are working in a
company and a hacker has your company list, he can use the list to guess
usernames and passwords.

Therefore, if you are working in an environment where the Internet is hugely


used, you are at the risk of attack.

2. Dictionary attack
Hackers are conscious of our laziness when it comes to choosing a password
for a computer system. They try to exploit this laziness when launching a
dictionary attack. The hacker will use a script or program to launch his
attack by working on all the common English words to gain access to your
system.

This is Wikipedia’s definition of dictionary attack: “… a dictionary attack


tries only those possibilities which are most likely to succeed typically
derived from a list of words, for example, a dictionary (hence the phrase
dictionary attack). Generally, dictionary attacks succeed because many
people have a tendency to choose passwords which are short (7 characters
or fewer), such as single words found in dictionaries or simple, easily
predicted variations on words, such as appending a digit.”

If your password is made up of simple English words, the attacker will gain
access to your system in a couple of minutes. That’s how powerful the
dictionary attack is.

However, even if your password is difficult, that is not a 100% guarantee


that you are not vulnerable to attack.

05
3. Keylogger attack
The keylogger attack is a bit different from the other password security
techniques discussed above. When launching a keylogger attack, the
hacker will track all your keystrokes with a malicious software or virus
that you are tricked into downloading as a harmless file that is carefully
embedded in your email.

Since all your keystrokes are tracked and recorded, the hacker will have
free access to your login ID and password. You can’t predict the next line of
action of the hacker after getting the information he is after.

4. Phishing
Phishing is the new poster boy of password attack. Through a seemingly
harmless email, you will be directed to another seemingly genuine but fake
website where your login details will be requested.

To make this attack technique successful, the hackers usually fake online
banking and payment system or other sites where your password will be
required. If you ignorantly submit the passwords, consider yourself hacked.

Rather than going through the stress of hacking your password, the hacker
will trick you into willingly revealing such sensitive information. That makes
it easy for him to have a go at attacking you.

06
5. Social engineering attack
This is the favourite attack technique of some dare devil cybercriminals.
It is the technique used by cybercriminals to trick innocent people into
divulging their sensitive information by taking advantage of human-to-
human relationship and interaction. They carry out this attack by using the
simple techniques:

●● The attacker may give you a call purportedly from your IT company
asking for your password for some verification process during a
phony maintenance process. If you are gullible enough to fall for
their scheme, you have exposed yourself to attack.

●● Some hackers have so much confidence that they will don a suit
and a badge and walk directly to the receptionist of a company
and directly ask for the password to the company’s access network
under some crazy disguise. If you believe this is absurd, wait for
the shocker in this book.

●● In some cases, the hackers will get all the necessary information
by putting a call or two across to your vendor. Funny enough, you
can’t guarantee that your vendors won’t release the information. If
you doubt that, read the heart-rending account of how a man has
his digital life completely wiped off with just two calls to Apple and
Amazon. Yeah, you read that right: the tech giant, Apple, and the
reputable online store, Amazon.

It is quite surprising that many people have fallen for these gimmicks and
that has led to compromising their personal or business account with an
amazing degree of success.

07
Bypassing Computer/Laptop
Password
Without launching a remote attack, you are still vulnerable to attack by
individuals who can get close to your system. Sometimes, a friend or a
colleague can easily bypass your password and have free access to your
computer system. There are some effective ways this can be done. Consider
some common password bypassing techniques:

●● By using Windows Password Reset Disk: If you run your system


on Windows Operating System, your system has a built-in function
that makes creating a reset disk for your system possible. You can
use the reset disk if the need to reset your system arises in the
future. Anybody with access to this disk can reset your password
and launch an attack right there.

●● Restoring your computer to factory mode: Even if you use the most
difficult password in the world, restoring your computer to factory
setting will completely erase your password so that access to your
computer becomes easy without the need for any password. In the
process, all your saved data and everything else on your computer
system will be wiped off.

If your attacker has direct access to your computer, he can restore your
computer to the factory mode, thereby bypassing your password completely.
With full and unrestricted access to your system, an attack can be launched
before you are aware of it.

Therefore, don’t have the erroneous belief that all is well with your computer
simply because it is password-protected. Your security can be breached
within a couple of minutes with the right tools.

According to security experts, human factor remains the single most


important factor that determines people’s vulnerability to attacks due to
some human errors. How is that possible?

08
Common mistakes by users
Some simple and seemingly harmless mistakes can cause a serious breach
of your IT security. Most of the time, these mistakes are accidental and often
overlooked as unimportant. Yet, they can cause you serious cybersecurity
risk if you commit them.

Without a doubt, committing any of the common mistakes discussed below


can put you in a serious security breach that can have a direct negative
impact on you:

●● Device loss or theft: Losing your device accidentally or through


theft increases your security breach by 3.3%. In some studies,
it was claimed that the security breach may be increased by as
much as 15.3%. Either way, your chances of losing your security
increases if you lose your device or it is stolen.

The thief can go through your messages, files, images, documents,


videos, or business files to gather relevant information about you.
He can use the information garnered through this means to breach
your security.

●● Document errors: Errors stemming from document rank high


among the most common mistakes made by users that can lead to
serious data breach. Some typical example of such errors include
sending sensitive information to the wrong recipient, accidentally
publishing your private information to a public web server, or
carelessly disposing your confidential work information, and other
related errors.

09
If you commit any of these errors, your exposure to identity theft
increases. Hackers can steal your information and use it as an asset
to either blackmail you or use it for a direct attack on you.

●● Internet spyware: A little over 50% of all cases of security breaches


occur through employee’s abusing access privileges according to a
study. When clicking pop-up adverts or downloading software, any
accidental click on malicious spyware or downloading malicious
software will give hackers the information they are after. That
exposes the company to cyber attacks.

●● Enabling password reminder on your browser: Some people make


the mistake of giving their browser the permission to save their
password to make login into their account easier in the future.

Well, if you have the habit of giving this permission whenever you
visit a site, you are committing a blunder that can cost you your
information. Some hackers can easily get your password from the
browser and use it for whatever purpose suits them. I am sure the
purpose won’t suit you.

Watch out for these blunders and try to avoid them at all costs. Otherwise,
you run the risk of accidentally providing your sensitive information to
criminals that cannot be trusted with a piece of information of that level of
confidentiality.

10
How to protect yourself from
password breach?
While it is true that hackers can come up with different means of breaching
your password security measures, there are tons of practical tips that will
keep hackers at bay or reduce their impact to a reasonable level. Consider
applying these tips to protect your computer and see your security
measures receive a massive boost:

1. Install anti-virus software: This is an efficient technique that works


to reduce any cyber attack via a virus and other related harmful
computer programs. For instance, cyber attacks like keystroke
logger can be prevented through the intervention downloading
such harmful programs to your system.

2. Don’t click links indiscriminately: Phishing attacks are done by


embedding links to harmful websites in an email message. Clicking
such link exposes you to the danger of cyber attack. If you cultivate
the habit of not clicking any link that is attached to your mail, you
can reduce your exposure to attacks via a phishing email. The simple
rule is that if you have an iota of doubt about the authenticity of a
link, obey your instinct. Don’t click it.

3. Restrict access to your system: Ensure that your computer system


is not accessible to every Tom, Dick, and Harry. Restrict access to
your system to people you can trust with your life. That will reduce
the risk of having your password bypassed. If you can’t account
for those who visit your system, you can’t pinpoint the last user
or whoever has a secret plan of harming you. That may jeopardize
your security measures.

11
4. Don’t visit any website you don’t trust: If you receive a mail directing
you to another website, trust your instinct. And if you accidentally
click the link, don’t give your confidential information on request. No
serious-minded financial institution or company will request for your
sensitive information online. The common practice is to contact you
in person if such information is really needed.

5. Don’t share your password: Sharing your password with other


people increases the chances of the password getting to someone
without the best intentions for you. What is more, it can be very
challenging to know who to trust and who doesn’t deserve your trust.

If you don’t know who to trust, you should keep your password to
yourself, and not anyone else just as you can’t give your home key to
someone you hardly know.

You need discretion here. That will save you from heartbreak.

Although there are different ways hackers can attack you and trick you into
giving them your confidential information, you can still wage a good war
against them. These simple but effective security tips will help reinforce
your security and reduce your exposure to attacks from the cyber world.

12
CHAPTER 2
Social Engineering

13
I have briefly mentioned social engineering when discussing different
cyber attack techniques in the preceding chapter. Well, there is more
to this attack technique than I just mentioned in a few sentences. Let
me give you comprehensive information detailing the different social
engineering examples and the tools commonly used for this dastardly act
by cybercriminals.

For the uninitiated, social engineering is “the use of deception to manipulate


individuals into divulging confidential or personal information that may be
used for fraudulent purposes.” This is Wikipedia’s definition of this cyber
attack technique. Therefore, any technique that is used to trick you into
revealing your confidential information is social engineering.

Social engineering attack is one of the most successful attacking techniques.


To its credit, there are different social engineering techniques with different
degrees of success. What is common among all these techniques is their
success rate.

Over the years, many individuals and corporate organizations have fallen
victim to the gimmicks of hackers that used different forms of social
engineering to brainwash them into doing the unthinkable.

Perhaps, some examples of where social engineering has been used


effectively will give you a second thought about it.

Social engineering attack


examples
Well, if you are among some people who believe that social engineering is
an over-hyped security threat and need to be convinced that it is real and
can be really dangerous, consider these few examples of the damage that
social engineering can cause:

14
1. RSA SecurID Breach: Well, this attack has all the elements of a
humorous irony. RSA SecurID is a security company but accidentally
fell for social engineering technique. When relating the experience
in its blog, the victim company said: “The attacker, in this case,
sent two different phishing emails over a two-day period. The two
emails were sent to two small groups of employees… The email
was crafted well enough to trick one of the employees to retrieve
it from their Junk mail folder, and open the attached excel file. It
was a spreadsheet titled '2011 Recruitment plan.xls.” What was
the result of the attack? It cost the company’s parent company,
EMC a whopping $66 million to recover from the attack.

2. ABN Ambro Bank attack: This attack looked so impossible that it


would have won a Grammy Award in any category. It was simply
like acting out a Hollywood script. In 2007, an anonymous man
robbed the bank and carted away diamonds and some other
valuable gems valued at $27.7 million then. How did he breach the
bank security? In the words of the spokesman for Diamond High
Council, Philip Claes, “He used one weapon- and that is his charm-
to gain confidence. He bought chocolates for the personnel…he
charmed them, got the original of keys to make copies and got
information on where the diamonds were.”Yes, he did it without any
technology-just his charm.

3. Associated Press Twitter Jack: In 2013, Associated Press had its


Twitter account hijacked. The tweet: “Breaking: To Explosions in
the White House and Barack Obama is injured” went viral without
any verification. This news was false, the hackers (Syrian Electronic
Army) tweeted this after they have successfully taken over the
news wire service’s account.

You can imagine the impact of such false news about a sitting
president. It had so much huge impact that in just 3 minutes, the
stock market dropped drastically.

15
This attack was triggered by a simple message and the whole world
was deceived by some ingenious hackers.

4. Nigerian Prince Scam: In 2007, the treasurer of Alcona County in


Michigan, Thomas Katona, embezzled some $1.25 million from the
$4million in the county’s account. A huge bulk of this money was
paid to a scammer.

In 2013, a study was conducted on related scams carried out by


Nigerians known in their country as “419.” The study revealed that
Americans have lost about $82 million to such scams while the
international community has lost a whopping $12.7 billion globally.
To the surprise of the researchers, the victims always defend the
fraudsters. Why? That’s the power of social engineering.

5. Target Third-party Take-down: In 2013, Target experienced one of


the worst days in the company’s business life. During the attack,
over 40 million credit and debit cards were lifted. This showed how
dangerous social engineering attack can be.

According to investigators, “the attackers initially gained access


to Target's network using credentials obtained from heating,
ventilation, and air-conditioning subcontractor Fazio Mechanical
Services via a phishing email that included the Citadel Trojan.” A
third-party became a willing but unconscious tool in the hands of
some hackers.

These few examples are sufficed to help you understand how powerful
social engineering is. Without a doubt, if these big organizations can fall
for social engineering, you have to be on top of your game to launch a
successful attack against any form of social engineering attacks.

16
Tools available for social
engineering attacks
A wide variety of tools is used by hackers to carry out their harmful attacks.
Some of the commonly used tools are:

●● Pretexting: This is a social engineering tool that involves creating


a convincing pretext or an effective fabricated scenario for stealing
some valuable personal information from unsuspecting victims.

●● Baiting: In baiting, a hacker lures its victim with the promise of a


reward that is convincing enough for the victim to reveal his or her
confidential information.

●● Familiarity exploit: Familiarity exploit ranks high among the best


social engineering tools. The hacker tries to get acquainted with
his prey. Gradually, a bond is formed that eventually causes the
prey to lower his or her guard, making the prey an easy target.

●● Tailgating: This tool is otherwise known as piggybacking. It occurs


when someone without authorization follows authorized personnel
into a restricted area with the goal of stealing valuable information
in the process.

●● Gathering information: The success of any cyber attack, social


engineering inclusive, depends on the attacker’s ability to have
the relevant information that can be used to attack a prey. So,
information gathering is a good tool that hackers have used to their
advantage, and successfully too.

They have been using these tools for years and have found a reasonable
amount of success from it. Many unsuspecting victims have been defrauded
by using the information they gather through this means.

However, you still have a good chance at breaking their hold on you if you
can apply some practical safety precautions against such attackers.

17
How to protect yourself from
social engineering attacks
Falling victim of social engineering can have dire consequences on you.
You may lose confidential information that may have a huge impact on your
business, finance, and lifestyle. This highlights the urgency of executing
some preventive measures to ward off potential attacks.

These tips will give you an edge over potential attackers:

●● Question everything: One of the most effective weapons against


social engineering attacks is to develop a sense of healthy
skepticism. Complement that by being as vigilant as possible.
Question any move that requires revealing your confidential
information. Why should your bank or other financial institutions
redirect you to another website where your information is requested
when they can easily get the information from their database? Why
should your “vendor” give you a call and ask for your login details
via phone while you can easily visit their office for any verification?
By questioning everything where your confidential information is
involved, you will reduce your vulnerability.

●● Don’t give out any information without verification: When your


confidential information is requested via a phone call, a personal
visit to you at home, via email message, or any other means, don’t
readily be pressured into divulging the information. Make sure that
the identity of the person or organization making the request is
confirmed before you part with such information. That will spare
you the headache of giving your information to the wrong person.

●● Make good use of the shredder: Shredders are not some toys
you keep at home or in your office to play with. They are there for
a purpose. Why should you make yourself vulnerable to attacks

18
when a shredder can help you out? Even if you use digital data,
ensure proper disposal of the information and render it useless for
whoever stumbles across it. Shred that piece of document before
putting it in the waste basket. When hackers scavenge, he won’t
have enough information to attack you with.

●● Educate yourself: This is obviously one of the most effective


techniques against social engineering attacks. Some practical tips
may become outdated with the passage of time. That makes it
imperative that you should always be abreast of any development
in the cyber security world. Acquaint yourself with their techniques
and effective preventive techniques. Even if the current tips
become obsolete, rest assured that there will always be effective
techniques. Educating yourself will make this happen.

●● Stick to your guns: Sometimes, the inability to make their stand


known and stand by it is one of the reasons why many people have
been tricked into revealing their personal information when asked
over the phone or in person. No matter how high the amount of
pressure is, stick to your guns if you feel insecure parting with

19
information. Chris Hadnagy, the operation manager of Offensive
Security and the co-founder of socialenineering.org gave this
useful tip: “If someone asks for information that you don't know if
you should release, ask your manager, many social engineers will
break if off if there's a break in the conversation.” You may find
this tip handy when you are under pressure to give out well-guided
information.

Prevention, they say, is better than cure. Applying these useful tips will
guarantee you improved security and minimize your attacker’s chances of
gaining victory over you.

By constantly going over these tips, you will become accustomed to them
until they become an integral part of your security routine.

20
CHAPTER 3
Simple safety tips for securing
your email account

21
Your email account is perhaps one of your most valuable assets in the
digital world. Communicating with your clients, customers, employers, or
employees becomes very easy when you have a valid email account.

The increased use of email accounts has made it the primary target of many
cyber attacks. A notable example is phishing attack that is built on email.
The popularity and success of the attack are reasons why securing your
email accounts become a necessity, rather than an unnecessary luxury.

Common email attacks


Email attacks come in different forms. The attacks are launched with the
goal of compromising your company or tricking you into downloading
malware that may compromise your computer’s security. The attacks may
also be used to force you into divulging personal information to the wrong
recipients, cybercriminals.

The techniques discussed below have been used to carry out several
attacks on unsuspecting individuals and corporate organizations:

1. The CEO wire fraud attack: Email attack is carried out for different
purposes. The goal of this type of email account attack is to lure
individuals with access to important financial information and
can wire funds into revealing some information that can be used
to illegally wire transfer to the hacker’s account. The executive is
deceived by sending a message that is purportedly from a higher
executive demanding a wire transfer to a given account. In a recent
case involving Ubiquiti Networks Inc, the attackers succeeded in
defrauding the company to the tune of $46.7 million.

A few tips that can help you identify this fraud are:

●● If the email requests that you make an international wire fund


transfer.

22
●● You are put under pressure to complete the transfer without any
delay.

●● Normal procedures for carrying out such transaction are


circumvented.

If you notice any of the above in an email that requests you to make a wire
transfer, it is obvious that you are dealing with cybercriminals.

2. Malware attachment: When you receive a PDF attachment in your


email, be sure that the attachment is a real PDF document and
not a spyware. This is important because malware attachment
is disguised as a harmless PDF file while in the real sense, it is
designed to deceive you into downloading any software that will
compromise your security thereby exposing you to unexpected
cyber attacks.

Identifying this attack type is easy if you use these tips:

●● If the email is generic without any reference to a previous


conversation or agreement.

●● If the subject is generic and suspicious.

●● An email reference from a free mail account to a business mail


account. When a private mail account is used to make a request for
wire transfer instead of a business mail account, that is probably
a scam.

Cyber attackers use this method to explore the human nature of always
being in a hurry to get things done. The attackers select business
executives, corporate leaders, and others on the assumption that such
individuals are too busy to check any mail thoroughly to look for potential
signs of a possible attack.

Their inability to exercise enough patience to check their mails thoroughly


for possible signs of potential attacks has cost most of the victims to this

23
type of attack their reputation, business, and money.

Download click bait


This is the arguably the most dangerous attack that preys on people’s
ignorance of software programs and systems. In such an email, a link for
downloading a file is embedded in the mail with a link directing you to visit
a page with a familiar structure and content as the page you are already
familiar with.

The following tips will help you identify such a harmful email attack:

●● The email lacks the touch of professionalism. You should spot the
difference easily.

●● Asking you to enter your login details for a website where you are
already logged into. That sounds funny, right?

●● Illegitimate web address. For instance, if the original website has


a .com extension, watch out for the extension of the link you are
directed to. Any change you notice in the extension is a sign that
you must log out of the account as fast as you can.

Whenever you have an email message, look for the signs above. One or a
combination of some of them is an indication that you are dealing with a
spammer. With your security alarm ringing, take the proper protective step
to prevent yourself from falling victim to such cheap scams.

Phishing
Phishing is one of the social engineering techniques that have been
successfully used for stealing user data such as credit card numbers and
login credentials. This is usually done when the attacker, disguising as a
trusted organization or vendor, deceives a victim into opening instant
messages, an email message, or a text message with the goal of using the
technique to dupe them. This can have serious consequences on the victim.

24
Some effects can be the installation of malware on the system, freezing the
system, or stealing and storing of sensitive information.

Look out for these to ascertain whether an email is a phishing email or


not:

●● Bad grammar and spelling: Most cybercriminals are reputable for


their bad grammar. Unlike reputable organizations that can afford
to high editors that will ensure that any information emanating from
the company meets standard grammar rules, a cybercriminal can’t
afford such luxury. Therefore, a common trend is an email with tons
of grammatical and spelling blunders among such hackers. Look
out for this sign too.

●● Links in an email: Since they want a way to collect your sensitive


information, the people behind a phishing email will always include
a link to an external website designed for collecting information
from you. So, whenever you receive an email message with an
embedded link, switch on your security alert. Roll your mouse
over the link without clicking it. Check the address that is revealed
after rolling the mouse with the address in the link and see if
they correspond or not. If the addresses do not match, that’s the
confirmation that you are dealing with hackers.

●● Spoofing popular companies or websites: They bank on the


popularity of reputable organizations to trick people into revealing
their information. This may come in different forms, including the
usage of graphic images that mimic that of the company, its name,
or logo. If you are gifted with giving attention to details, you will
spot the differences.

●● Threats: To give their message a sense of urgency and move their


victim to quick action, they include threats in their messages. One of

25
their most successful threats they are fond of using is threatening to
ban your account if you don’t respond to their request immediately.
This is responsible for the swift response of most of their victims.
The fear of losing their accounts makes them overlook what they
should have done to prevent themselves from attacks.

These are obvious signs that you are dealing with hackers. Don’t forget to
act decisively whenever you receive an email that ticks all the boxes.

Spam
Email spam, or junk email, refers to an electronic spam that involves sending
unsolicited messages via email to people.

Most of the email messages considered email spam are used by commercial
organizations for marketing purposes while some of them emanate from
phishing sites with disguised links for defrauding purpose.

In the past decades, email spam is on the rise. Millions of people have
fallen for the gimmicks of perpetrators to such malicious acts and have lost
hundreds of millions of dollars in the process.

The spammers behind these spams collect email addresses of their

26
CHAPTER 4
Practical safety tips
when using public
Wi-Fi networks

27
For a couple of reasons such as trying to save data on your PC or mobile
device or working from your hotel room or an airport, you will find Wi-Fi to be
handy. It will help you to get things done quickly without having to worry about
whether you are running out of data or not.

Well, that’s pretty said about Wi-Fi. However, it has some security challenges
that make it worthwhile to consider some factors before using it. Many people,
out of sheer ignorance have fallen victim to different forms of cyber attacks
such as identity theft when using a public Wi-Fi network.

It is advisable that you are familiar with the potential risks you can run into
when surfing the net on a public network. Let me give you a list of some of
these challenges.

Common Wi-Fi attacks


The launching of Wi-Fi as a wireless technology that makes browsing easier
and cheaper was greeted with jubilation by all tech lovers some years ago.
Sadly, Wi-Fi has not escaped the notice of hackers and cyber attacks. That has
led to serious loss of information and other difficult challenges by the users of
this technology.

Although there are different Wi-Fi attacks, I will discuss just a few of these
Wi-Fi threats:

1. Data interception: When sharing data over Wi-Fi, your security is not
100%. Expert hackers can find a way to intercept the data without
any hiccup. With a directional antenna, a hacker at some hundreds of
feet from you can “eavesdrop” and intercept your data.

2. Denial of service: A denial of service may occur when someone sends


de-authentication frames to your Wi-Fi network with the goal of
disrupting the wireless performance of your network. This is possible
because the two networks used by Wi-Fi, wireless and airwaves, are
susceptible to this attack.

28
3. Packet analyzer: These are computer programs that are designed
by cybercriminals to monitor the activities on a particular network.
This small program can also intercept data packages and reveal the
content of such packages. Hackers can use this to intercept a data
package and use the information in the package for their harmful
purposes.

4. Evil Twins: Evil Twins is a dangerous form of Wi-Fi attack that is a


replica of a rogue AP with a higher level of sophistication at disguise.
A real AP is the template that is used to design this form of attack.
Hackers can also clone your trusted AP so that whenever you connect
to the AP, you are connecting directly to the hackers and can get any
information they need from you.

5. Worms: If you know the mode of operation of a virus on a personal


computer, you will have an idea of how worms function. Nevertheless,
it is more complex and destructive than a computer virus.

For instance, without a program to live on, a computer virus is


powerless. Don’t have a similar sentiment about worms. Since they
can self-propagate, they don’t need any program to function. While
using your Wi-Fi in the public, the worms can attack your device from
another device that you share the same network with.

6. Endpoint attacks: Each user within a network is an end point.


Although most of the attacks on Wi-Fi are caused by the connection,
end points are still responsible for a good number of these attacks
too. Hackers can gain access to your laptop without giving you a hint
if they have access to one of the end points on a network. They firstly
create fake landing pages or phony websites through which they can
have access to the whole network. If your system is not used as the
entry point, you will hardly know that you are already at the mercy of
some dangerous hackers.

29
MITM
In computer security, MITM is the abbreviation for Man-in-the-middle
attack. This is an attack by a hacker by secretly relaying communication
between two people who have the misconception that they are having direct
communication. In some cases, the hacker may also alter some parts of the
messages he relays.

A typical example of MITM attack is eavesdropping. The attacker will make


an independent connection with the two parties and relay messages between
them while they still believe that their discussion is on a private connection.
In the real sense, that is hardly the case. The hacker is in total control of their
communication and can use it as he pleases.

Attackers that want to engage in MITM can use about three different techniques
to deceive the parties having the discussion. A determined hacker may choose
from these attacks:

●● ARP spoofing: In this attack, the attacker will use a fake ARP message
to link the IP address of one of the parties on a local area network with
his own MAC address. Hence, any data that is sent by the legitimate
user to the host IP address will be relayed directly to the attacker.

●● IP spoofing: The attacker, in this case, alters the packet headers


contained in a legitimate IP address by working under the guise of
an application. As a result of this alteration, any user that attempts to
visit any URL that is connected to the application will be sent directly
to the hacker’s personal website.

●● DNS spoofing: This spoofing method is also called as DNS cache

30
poisoning. The hacker infiltrates a DNS server to have access to the
website address record on the server. The altered record will now be
used by the hacker to send anyone attempting to visit the altered
website to the hacker’s site.

These attacks have made some people be wary of using Wi-Fi in the public.
They can’t withstand the thought of being deceived by a hacker into releasing
valuable information about themselves or their companies to the wrong person
that can turn the information into a potent weapon of attack.

While that is commendable, sometimes, you may be pressed into using a public
Wi-Fi for some reasons. In that case, you should find a convenient way of using
it without exposing yourself to the risk of attacks.

If for instance you must use it, some security measures will reduce your chances
of experiencing the security challenges that are associated with using public
Wi-Fi:

●● Watch what you do: You have tons of activities to attend to online-
checking of mails, reading your favorite blog, making an online
purchase, and the likes. While the first two pose little threat to you if you
opt for public Wi-Fi, the same cannot be said when conducting an online
transaction via the same tool. Since the online transaction will involve
using your credit card, login details and other sensitive information,
using a public Wi-Fi will be dangerous.

●● Turn Wi-Fi off when not in use: The rule of thumb in the security
community is that you don’t need to connect what you don’t need.
When using a Wi-Fi network without a proof of credibility, such as a
public one, it is advisable to turn your network off without delay. If you
can cultivate this security habit, you will not be as exposed as someone
who is always having his network turned on. That will guarantee the
safety of your tablet, laptop, or smartphone.

31
●● Update your antimalware and antivirus programs: Your security is
incomplete without this tip. Your device must always have a functional
antivirus and antimalware programs. But, having it is not sufficient.
The most reasonable thing to do is to always keep those programs up
to date. That is the only way you will always be abreast of any current
programs that will easily override an obsolete antivirus or antimalware
program. So, when using a public Wi-Fi, ensure that you are running
your device on a current version of whatever antivirus or antimalware
program you are using.

●● Protect your privacy: Antivirus and antimalware programs are very


useful in protecting your device from any harmful executable file you
download from the Internet. More is needed if you need full protection
for any form of potential attack. You must ensure that your browser
is well fortified with the right tools that are specifically designed to
ensure the protection of your privacy. You can find the most efficient
privacy-protection tools from trusted online vendors to beef up your
security.

●● Use HTTPS: If you must visit a site while on a public Wi-Fi network,
experts suggest that you should only use sites with HTTPS rather than
the conventional HTTP. The difference lies in the degree of security
offered by the site with HTTPS. The HTTPS ensure that any information
you exchange over the site is encrypted for security purpose. It is a
good way to reassure yourself that your security cannot be easily
breached while using that site. Such sites always have a closed-
padlock symbol at the extreme left side of the address bar as a sign of
protection of your data.

Whenever you are online, always remember that your protection should be
your primary responsibility. The more security measures you can put in place,
the harder it will be for attackers to gain control of your information. That will
ensure that your information is safe and cannot be used against you.

32
CHAPTER 5
Top tips for securing
your mobile devices

33
In recent years, breach of security has also been taken to mobile device
users. In this year alone, the number of mobile device users is estimated to
be over 4.77 billion while the figure is expected to rise to an unprecedented
5.07 billion by 2019.

This has made mobile users the perfect target for cyber attacks. If you are
among the several billions of mobile device users, you are susceptible to
attack also.

Security issues with mobile


devices
Attacks on mobile devices are carried out in different forms. Some common
threats and attacks you have to look out for as a mobile device user include
the following:

●● Malicious code: Malicious code is a malware that is specifically


designed to trick mobile device users into buying the hacker’s idea.
Some outstanding malicious code includes rogue applications and
spam. In what is known as malvertising, mobile devices are gaining
increasing popularity among the devices that are increasingly
targeted by the developers of malicious code. One of such malicious
code is a malware Trojan with the goal of stealing data from gullible
mobile users. This Trojan is mostly sent as an SMS. Clicking the
link hidden in the message will launch the Trojan and can spread to
other devices from the point of launch.

●● Communication interception: If your mobile device is Wi-Fi enabled,


you are susceptible to hacking. Smartphones are at higher risk of
attacks than other categories of phones. With the advancement in
technology, hackers don’t have to go too far to get the tools they
need to carry out such a dangerous attack. You are more at the risk
of such an attack if you can’t do without logging into enterprise

34
systems.

●● Device attacks: This is similar to attacks that were directed at PCs


in the past. The device attack can come as exploitation of buffer
overflow, via the browser, or other medium that the attacker feels
appropriate for the device. Sometimes, though, the attack may
come in form of MMS or SMS. The goal of this attack, most of the
times, is to gain unrestricted control of the target device or its
data. It may also be done to launch denial of service on the device.

●● Insider threats: Humans are considered the greatest threat to


the effectiveness of a security strategy. In this case, you may
be vulnerable to attacks due to your personal errors such as
downloading an infected app from any app store, downloading
games and others from websites that are specifically designed
for hacking unsuspecting mobile users. So, the simple act of
downloading your favourite game may increase your chances of
exposure to cyber attacks. Some mobile applications are also a
good avenue for wrecking havoc on your mobile device. Without
reliable information about the trustworthiness of a device, using a
third-party application without any discrimination will expose you
to cyber attacks.

●● Ad and click fraud: According to researchers, this is becoming


a source of concern for security experts around the world.
According to a senior security personnel at Sophos, John Shier,
“Compromising that mobile device [through ad and click malware]
would be a nice way for a criminal to gain access to the internal
network of a company, possibly by sending an SMS phish, getting
someone to click on a link where they download a malicious app,
and then now that they’re on the phone and can control it, they can
steal credentials and gain access to the internal network.”

As the number of mobile device users keeps growing, cybercriminals will

35
want to leverage the huge figure to continue finding more convenient ways
to attack mobile devices. This calls for urgent action on your part if you
are using a mobile device. What can you do to put a stop to any attempt at
attacking your mobile phone or any other device?

How to protect your mobile


device from cyber attack?
Your mobile device is always at the risk of attacks. That has been the
trend for some years back and there seems to be no end to the attacks.
Rather than making yourself a sitting duck and becoming an easy target
for hardened hackers, you can minimize your risk by implementing these
simple security tips:

●● Set a password: Some people make the mistake of leaving their


phones unprotected. It is obvious that such a blunder makes
hacking the phone or stealing information from it manually pretty
easy. Therefore, set a password for your mobile device to reduce
unauthorized people from access to vital information on your device.
To get the best protection from setting a password, make the code
very difficult to hack. A simple tip is to use alphanumeric password
combination. You can also include some special characters to
increase the difficulty level of your password.

●● Patronize trusted vendors: Most mobile users have the habit of


downloading apps from the Internet. Most times, these are vendors
with insidious motives and shouldn’t be trusted. Patronizing them
puts you at the risk of revealing your sensitive information to
individuals who will have no remorse at using the information to
harm you. Some simple precautionary steps include checking the
reviews of any online app store you want to patronize, ensuring
the consistency of the website URL in the message sent to you
and that of the real owner of the website, and doing whatever you

36
can to confirm the
legitimacy of the
store. That’s a way
to prevent yourself
from losing your
information through
the installation of
viruses, identity
theft, and any
other harm through
malicious programs.

●● Backup your
data: If you have
valuable information or data on your phone, find a way to have
all your data backed up. You can keep your documents, contact,
photos, and others stored in an external source such as in the
cloud or Dropbox. In the case of accidental loss of your phone or
an outright theft, you can always retrieve your lost information.
In some cases, you can use the information to reset your
passwords to prevent the stealer access your private information.

●● Wipe off your data: You may have a reason for donating, reselling,
or recycling your phone at any time. It is safe to ensure that your
information is not given to the wrong person during any of those
means. Therefore, before going to eBay or donating it to a charity,
wipe off all your data on the phone. With a “clean” phone, you have
nothing to lose.

●● Install a security app: As the number of malware keeps increasing,


so are many companies bent on ensuring the security of your mobile
device. Some of these companies are dedicated to developing
security apps as a form of security against attacks. Install any of
these apps on your mobile device so that you can always scan your

37
CHAPTER 6
Common cyber
attacks and
preventions

38
Hackers and other cyber attackers have an arsenal that is full of destructive
weapons. This ensures that they don’t run out of the perfect attack to launch
against their victims.

These are some of the most popular and powerful attacks and practical
steps you can take to prevent yourself from becoming another number on
their list of victims:

1. Ransomware
This is a malicious code that cybercriminals use to kidnap your data, lock
you out of your system, and demand a ransom before you will be given
access to your system.

The motive for this type of attack is usually monetary and you will be given a
set of instructions to regain access to your system after paying the ransom.
In most cases, the attackers will ask the victims to make the payment in
virtual currency so that the identity of the criminal will be protected.

When you suddenly lose control of your system and important files are
encrypted, you may be forced to contemplate paying the ransom. That may
be hard on you.

39
Experts suggest that you should always do the following if you wish to be
protected against this form of attack and similar attacks collectively known
as cyberextortion:

●● Backup your devices regularly.

●● Update your software at intervals.

●● If you are an end user, don’t click on links embedded in your email,
especially if the email is from a stranger.

●● Do all you can to avoid paying the attackers.

●● Install ransomware protection on your system.

WannaCry ransomware attack


The WannaCry ransomware attack was launched in May 2017. The ransom
attack was targeted towards computers using the Microsoft Windows
Operating System. The ransomware encrypted data of the victims and
demanded ransom to be paid in Bitcoin cryptocurrency.

Launched on May 12, the ransomware attack infected over 230,000


computers in more than 150 countries from the United Kingdom to America,
Europe to Asia. It was so destructive that the United Kingdom lost some
parts of her National Health Service to the attack.

Some big companies in Spain such as FedEx, Telefonica, and Deutsche Bahn
were seriously hit by the ransomware too. It took the timely intervention
of a malware researcher to halt the spread of the ransomware a few days
after its launch.

40
Preventive measures against
WannaCry ransomware
WannaCry wrecked much havoc during the few days of its existence. It
would have been more destructive than it was if not for the interference
of the researcher. Well, he may not always be around to help you stem the
attack in the future. Therefore, you have to be personally responsible for
preventing yourself against the dreaded attack.

You can protect yourself from sudden cyber attacks with these tips:

●● Update your Windows O/S: Since the ransomware exploited a


loophole in older versions of the Windows Operating System,
users with the older versions of the O/S are at greater risk than
users running their system on the newer versions. So, you should
consider updating your Windows O/S if you are still running your
system on the older version.

●● Turn your Windows update on: Due to people’s experience with


the automatic updates of Windows 7, most Windows users have
cultivated the habit of switching Window’s update feature off.
However, since that problem has been addressed in Windows 10,
you should always turn this feature on.

●● Install a ransomware blocker: Even if you have the latest antivirus


installed on your computer, installing a dedicated ransomware
blocker will offer you more protection than the antivirus can offer.
The web will give you a list of trusted ransomware blocker vendors.
The few bucks you pay will be insignificant to what you will lose to
ransomware if you become a victim.

41
2. Man-in-the-middle attack
Blocking a determined hacker from subjecting you to MITM attacks can
only be done if you can combine the following preventive measures with
some verification and encryption methods:

●● If a Wi-Fi connection is not password protected, avoid using it.

●● If your browser notifies you that a website is unsecured, be vigilant.

●● Whenever you are not using an application, even if secure, log out
of the application.

●● Don’t use public networks if the transaction you want to do is


sensitive.

If you are a website operator, the following preventive measures will help
you out:

●● Use communication protocols that are secure such as HTTPS and


TLS.

●● Encrypt and authenticate all transmitted data to reduce spoofing


attacks.

The combination of these security tips will prevent a hacker from intercepting
any information you pass over a Wi-Fi network. That will assure you that
your sensitive information is not lost to the wrong hands in transit.

42
3. Keyloggers attack and prevention
I have written about keyloggers attack in one of the preceding chapters
of this book. It is very difficult to detect the attack and that makes it a
very destructive attack. While a virus will limit its activities to crashing a
computer, ruining its files or hard disk, a keylogger will steal your valuable
information such as credit card number and password. These are the
information that the hacker will use against you.

There are many ways to prevent this attack. Your chances are improved
by these techniques:

●● Use a firewall: A keylogger attack is ineffective without the support


of a third-party program. That is where a firewall comes pretty
handy. It will provide the line of defense that will incapacitate the
attack and offer your system the needed protection against the
deadly attack.

●● Install a password manager: If you don’t type in your keyword,


a keylogger can’t get your password. That is a vulnerability that
will be explored if you install a password manager. The password
manager will take the responsibility of manually typing your login
details from you and automatically fill the form whenever you want
to access to your system. That way, any keylogger will have nothing
to steal from you.

●● Update your software: Sometimes, a keylogger can exploit any


vulnerability in your software to attach itself to your files. From
there, it will carry out its destructive activities. What you can do
to prevent it is to ensure that all the software programs on your
system are updated as and when due.

43
●● Change your passwords: Changing your passwords frequently is
another effective preventive measure against this attack. When
you do, it becomes impossible for the keylogger to monitor your
password and steal it.

With these methods, you have a good chance of decreasing your exposure to
infection by these attacks. Although there is no perfect preventive measure
against a keylogger attack, you can offer yourself a better protection with
these tips than exposing yourself to attack without taking any measure to
prevent it.

4. Email phishing attack and prevention


Phishing is another harmful cyber attack with dire consequences for
the victim. Through phishing, you will be directed to a fake website via a
link that is embedded in your email. The goal is simple: deceive you into
stealing your sensitive information such as credit card, login details, and
other highly sensitive information.

You can use the following tips to prevent phishing attacks:

●● Don’t release your information to individuals you don’t trust.

●● Don’t visit any website if the link is embedded in your email.

●● Look out for grammatical error in the email sent to you.

●● Check your accounts periodically for irregularities.

44
●● Don’t enter your information on any website if you have an iota of
doubt about its security.

●● Beef the security of your computer. Some updating here and there
will do.

Spoofing attack and prevention


Spoofing attack can expose you to a lot of dangers. When conversing with a
total stranger who masquerades as your friend, you are at the risk of both
physical and financial harm. You can prevent that by using these tips:

●● Use packet filters: These filters will inspect your packet during the
course of being transmitted across any network. They are mostly
used for the prevention of IP address spoofing because they can
easily identify packets with inconsistent address information.

●● Use spoofing detection software: Detecting spoofing is also easy


if you have spoofing detection software installed on your system.
The software inspects and certifies any data before it is transmitted
on the network. Any data with any traces of spoofing will be
automatically deleted.

●● Leverage the power of cryptographic network protocols: There


are many secure communication protocols that you can use to
prevent spoofing attack as it encrypts data prior to sending it to the
recipient. Immediately it is received, the protocols will authenticate
the protocol. Some trusted protocols include Secure Shell (SSH),
Transport Layer Security (TLS), HTTP Secure (HTTPS), and a host
of other trusted protocols.

By implementing the preventive tips for each form of attack, you will
gradually build a fortress around yourself and reduce your vulnerability to
attacks. That way, hackers will find it difficult to have an easy ride with you.

45
CHAPTER 7
Notable cyber attack
cases

46
You may be wondering
why this hype about
cyber attacks. Well,
if you haven’t been
exposed to such
attacks, you may find
it extremely difficult to
understand that there
are tons of ways you
may be attacked by
hackers.

There are tons of case


studies to show you
how powerful these attacks can be and the extent of damage they can do.

I have selected a few case studies from the huge pile of such cases reported
around the world. Let me start with one of the most recent cyber attacks,
the Tesco Bank cyber attack.

1. Tesco Bank Hack


In November 2016, Tesco Bank experienced the fury of cybercriminals
when the bank was attacked. The bank’s computer system was hacked
and the hackers stole a whopping £2.5 million from more than 9,000
customers. This cyber attack was regarded as the largest in the history of
the country. The attack was suspected by experts to be done via the bank’s
online banking system.

According to some reports, the hackers used the money for purchase from
retailers across the world through mobile-phone payment. Some customers
were of the opinion that the stolen money was moved across the world to
the United States, Brazil, and Spain. That led to the suggestion that the
hackers have ties in these countries.

47
2. Polish banks hit by malware
In February 2017, Polish banks woke up to a devastating malware attack
that left the country in total awe of the efficiency and degree of the damage
done by the malware. Several other companies also discovered the malware
on their workstations.

What is the source of this malware attack? Sadly, it emanates from the
Polish Financial Supervision Authority, the banking sector’s financial
regulatory body. That’s the irony of the case. According to an online source
“Ironically, it is the KNF that sets cybersecurity standards for Polish banks
but it is thought that a modified JS file resulted in visitors to the regulator's
site loading an external JS file which then pulled down malicious payloads.”

Although it was reported that no customer lost any money in the attack,
it was undoubtedly unexpected. It caught them unaware. The fact that it
emanated from the regulatory body made it more alarming for them.

3. Russia’s FSB plot on Friday


Russia was also not spared the rod of hackers when some terrorists used
Telegram messaging app as a potent weapon for carrying out terrorist
attacks in the country’s capital, Moscow. The suicide bombing was deadly
according to some reports as the death toll from the attack was 15.

According to a report, “Telegram has become the most widely used app
of its kind by terrorists operating inside Russia.” Surely, hackers can turn
anything into a potent weapon whenever they want.

48
4. Lloyds Banking group and the 48-hours attacks
From January 11-13, 2017, Lloyds Banking Group went through a 48-hour cyber
attack as daredevil criminals made a frantic attempt to stop over 20 million UK
account owners from gaining access to their accounts.

During the two days of the attack, there was an unprecedented denial
of service as Halifax, Lloyds, and Bank of Scotland had to deal with fake
requests that ran into millions. The goal of the attack was to pull the Lloyds
group to a halt.

These are some examples of organizations that felt the wrath of


cybercriminals on different occasions. Some of these organizations were
caught unaware and unprepared for attacks of such magnitude.

Know that if they can become victims of cyber attacks, you should always
watch your back. You are not immune to attacks too.

49
Conclusion
It is imperative that you take your security awareness seriously. Although
no technique gives you 100% assurance of immunity to cyber attacks, you
can still find solace in knowing that you do your best to fortify yourself
against any attacks.

Knowing the types of attacks and how to handle them is a good way to start
with. It helps you know the possible threats and how to avoid them.

Don’t forget the practical tips too. They will help you fortify your security
and reduce the impact of potential attackers on your system. Always
ensure that you do everything within your power to stay abreast of any
development in the cyber community to equip yourself with the knowledge
of recent attacks and the preventive measures against them.

And lastly, don’t forget to always back up your sensitive information. You
may need the back up in the future.

As you implement all these tips, you are covered from sudden attacks and
you should live in the knowledge that you have done what is required of you
to provide adequate security for yourself and your system.

50
About Condition Zebra

Condition Zebra is an information and risk management solutions provider,


offering one-stop solutions including penetration testing services and training.
Condition Zebra’s strategy of combining key technologies with exclusive expertise
aims to mitigate operational, legal and financial threats for organizations and
reduce risks to a manageable and resolvable level.

Condition Zebra’s Penetration Testing Process

Information Gathering:

“Give me six hours to chop down a tree and I will spend the first four for
sharpening the axe.”

by Abraham Lincoln

In this phase we find all possible attack vectors and sensitive information for
planning further attacks.

Scanning:

Fully automated advanced tools are used to identify network and application
vulnerabilities. But we don’t surrender completely on tools because automation
tools can only find pre-defined vulnerability. We believe vulnerabilities are not
confined to a certain number.

51
Vulnerability Assessment:

This is the main phase which makes us different from others. We use manual
testing techniques to stretch into some security holes where an automation
tool cannot reach. Our security experts will generate Proof of Concept for every
vulnerability to avoid false positives.

Exploitation:

Once a vulnerability is confirmed, we will try to penetrate into the system


without causing any damage to client’s data. This phase aims to create an
awareness about the practical impact on the company. As always, we promise
our clients that we never twitch anything which is not under our scope; and we
do deliver the same.

Reporting:

Reporting is another important aspect which strengthens our values in the


market.

Simple: Our utmost priority is given to reporting. We try to make it as simple as


possible with complete details without compromising the time factor, so that
it would be easy for both the management and in-house security maintenance
people to understand it.

Reproduce the Attack: Our clients can verify whether the vulnerabilities reported
by us are really existing, by following the steps that are given in the report.

Proof of Concept: We include the snapshots to prove each identified vulnerability.

Remediation: We provide two solutions to prevent from becoming a victim


to cyber-attacks – one being a temporary solution and the other being a
permanent solution. The permanent solution included is not a generic method.
We ensure it to be the best suitable and the most compatible solution for each
and every client.

Retest:

We always welcome our clients for retest at anytime in a year without additional
charges.

52

You might also like