You are on page 1of 19

Cyber Security

Training
By – Shreyash Shukla
What is Cybersecurity is the protection of digital systems,
networks, and data from unauthorized access, theft, or

CyberSecurity ? damages. It includes protection from threatning process


like malware attacks , phishing attacks dos and ddos
attacks advance persistence attacks ,men in the middle
attacks ,social engineering attacks etc.
Cybersecurity
Vectors
Cybersecurity vectors refer to the various
methods and techniques that hackers use to
gain unauthorized access to computer
systems, networks, and data. These vectors
are constantly evolving and becoming more
sophisticated, making it increasingly
challenging for organizations to protect their
digital assets
Lets
Anti-Viruses
Antivirus software is a program or set
of programs that are designed to
Functions Of Antivirus prevent, search for, detect, and remove
software viruses, and other malicious
Scanning software like worms, trojans, adware,
When a new virus is detected in the and more.
cyberspace, antivirus producers start
writing programs (updates) that scans
for similar signature strings.

Integrity Checking
This method generally checks for
manipulated files in OS from the viruses.

Interception
This method is used basically to detect
Trojans and it checks the request made
by the operating system for network
access.
DOS & DDOS ATTACK

DOS is a denial of service attack, in this attack


a computer sends a massive amount of traffic
to a victim’s computer and shuts it down. Dos
attack is an online attack that is used to make
the website unavailable for its users when done
on a website. This attack makes the server of a
website that is connected to the internet by
sending a large number of traffic to it.

A DDoS attack is one of the most common types


of DoS attack in use today. During a DDoS
attack, multiple systems target a single system
with malicious traffic. By using multiple locations
to attack the system the attacker can put the
system offline more easily.
CNC SERVERS & BOTNETS
A CNC (Command and
Control) server is a
type of server that is A botnet is a group of
used to issue computers or other
commands to devices that have been
compromised infected with malware
machines or devices. and are under the
Cybercriminals control of a remote
typically use these attacker. These
servers to control compromised devices
malware, such as are known as bots, and
viruses, worms, and the attacker can use
Trojans, which have them to launch various
infected a large types of attacks, such as
number of machines or distributed denial-of-
devices. CNC servers service (DDoS) attacks,
enable attackers to spam campaigns, and
remotely manage the credential stuffing
malware and use it to attacks. Botnets are
launch attacks, steal often controlled using
data, or engage in CNC servers.
other malicious
activities.
Steganography
What is steganography ?
Steganography is the practice of concealing a message or information
within another object, file, or message, in a way that is difficult to detect.
The goal of steganography is to hide the existence of the message or
information, rather than to encrypt its contents.

Audio Steganography Text Steganography


This type of
This type of
steganography involves
steganography involves hiding information within a
hiding information within text document. This can
an audio file. This can be be done by altering the
done by altering the spacing between words or
frequency of certain by using invisible
sounds or by adding characters to hide the
inaudible sounds to the information.
Video Steganography
file.
Image Steganography
This type of
steganography involves This type of
hiding information steganography involves
within a video file. This hiding information
can be done by altering within an image. This
the frames of the video can be done by altering
or by hiding the color values of
information within the pixels in the image or
video's metadata. by hiding information
within the image's
metadata.
NETWORK
ATTACKS
WHAT ARE NETWORK ATTACKS ?
A network attack is a type of cyber attack that
targets a computer network or system in order to
gain unauthorized access, steal data, or cause
disruption. Network attacks can come from both
internal and external sources, and can range from
relatively simple attacks to highly sophisticated,
targeted attacks.
This module includes:
• Scanning Methods
• Man in the middle attack
• ARP poisoning
• DHCP Starvation
• LLMNR Attacks
• Offline Password bruteforce
• Working with Responders
Scanning Methods
Network
Scanning
Scanning is a critical component of
network security that involves probing a
network or system for vulnerabilities,
weaknesses, and potential entry points.
Scanning methods are used to identify
potential security threats and to help
network administrators to take appropriate
measures to mitigate them. There are
several types of scanning methods that are
commonly used in network security,
including:

HOST Based Penetration


01 External Scans
02 Internal Scans
03 Scans 04 Testing Scans
This type of scan looks at your network This scan will discover and catalog Host-based agents monitor system IT teams can go beyond passive
from the hacker’s perspective. It scans your core IP-connected endpoints, activity for signs of suspicious scanning with penetration testing
external IP addresses and domains, such as laptops, servers, peripherals, behavior, including repeated failed tools. In penetration testing (often
probing for vulnerabilities in internet- IoT-enabled machines, and mobile login attempts, changes to the system called pen tests) security experts
facing infrastructure to determine which devices. registry, or backdoor installations. simulate how malicious hackers may
ones can be exploited. attempt to infiltrate your network.
Man In The Middle Attacks
A Man-in-the-Middle (MITM) attack is a type of cyber attack where an
attacker intercepts the communication between two parties, allowing the
attacker to eavesdrop, modify, or inject data into the communication. In this
type of attack, the attacker positions themselves between the two parties
and captures their data in transit.

To protect against MITM attacks, it is important to use secure


communication channels, such as encrypted connections, and to implement
strong authentication measures, such as two-factor authentication. It is also
important to regularly monitor network traffic for suspicious activity and to
implement network security measures, such as firewalls and intrusion
detection systems, to detect and prevent these types of attacks.
ARP Poisoning
ARP (Address Resolution Protocol) poisoning, also known as
ARP spoofing, is a type of cyber attack in which an attacker
sends falsified ARP messages over a local area network (LAN),
with the aim of linking the attacker's MAC address to the IP
address of another device on the network, such as a gateway
or a router.

In an ARP poisoning attack, the attacker sends fake ARP


messages to the other devices on the network, falsely
claiming to be the gateway or router. Once the attacker's
MAC address is associated with the IP address of the gateway
or router, network traffic intended for those devices is
redirected to the attacker's machine, allowing them to
intercept and manipulate the traffic.
To protect against ARP poisoning attacks, it is important to
use network security measures, such as implementing secure
ARP protocols, using encryption and authentication measures,
and monitoring network traffic for suspicious activity.
Additionally, using tools such as ARPwatch or Wireshark can
help in detecting ARP poisoning attacks.
DHCP Starvation
DHCP (Dynamic Host Configuration Protocol) starvation, also known as DHCP exhaustion, is a
type of network attack where an attacker floods a DHCP server with requests for IP
addresses, causing the server to run out of available IP addresses to assign to new devices
on the network.

To protect against DHCP starvation attacks, it is important to implement network security


measures, such as limiting the number of DHCP requests that can be sent by a single device,
setting lease time limits on IP addresses, and monitoring network traffic for suspicious
activity. Additionally, implementing DHCP snooping, which is a security feature that
enables switches to filter and block DHCP traffic, can help in mitigating DHCP starvation
attacks.
LLMNR Attack
What is LLMNR attack ?
LLMNR (Link-Local Multicast Name Resolution) attack is a type of cyber attack that exploits the LLMNR
protocol, which is used in Windows operating systems to resolve the NetBIOS names of other devices on the
local network.
In an LLMNR attack, an attacker sends a spoofed LLMNR request to a target device on the network, asking for
the NetBIOS name of another device. If the target device is unable to resolve the requested name, it will send
a broadcast query to all other devices on the network, including the attacker's machine

LLMNR attacks can be used to steal sensitive information, such as login


credentials, or to launch further attacks on the target device or network. They
can also be used as a reconnaissance tool, allowing the attacker to gather
information about the target network and its devices.

How to protect against LLMNR Attacks ?


To protect against LLMNR attacks, it is recommended to disable the LLMNR protocol on all devices
on the network, as it is not required for normal network operations. Additionally, using security
measures such as firewalls, intrusion detection systems, and network segmentation can help in
detecting and preventing LLMNR attacks.
Offline Password Bruteforce
Password
Bruteforce
01 02
Through Network Sniffing Bruteforce Tools
When you connect to the shared drive to try to Brute-force attacks can take place offline or
access that file you need, you have to prove you have online. In case of an offline attack, the
permissions to view the file you are trying to access.
attacker has access to the encrypted
This is what prevents the marketing department from
reading the HR folder. The way that works over the
material or a password hash and tries
network is that the shared drive will send you a different key without the risk of discovery or
challenge, and you will compute a new value using interference. In an online attack, the attacker
your hashed password and the challenge, and send needs to interact with a target system . We
that back to the server for authorization.
04 03 use tools like John the ripper ,and hashcat.

Through NTDS File


If an attacker is able to get domain administrator
Dumping Memory Content credentials and gain access to the domain
Once an attacker gains administrative access to a single controller, they can gain access to the NTDS file.
server or application, they can dump the contents of This file holds the hashed password for every user
memory, including the SAM file. Remember above how I on the domain. This is obviously worst case
said that your computer saves a hash of your password
scenario for an organization and a pot of gold for
that it checks every time you login? Well, this is saved in the
SAM file (for Window’s computers), and an attacker with an attacker looking to launch offline password
admin level access can dump this file, revealing the hashes attacks.
of all local accounts on the system
Working with Responder
What is Responder
Responder an LLMNR, NBT-NS and MDNS poisoner. It will
answer to specific NBT-NS (NetBIOS Name Service) queries
.By default, the tool will only answer to File Server Service
request, which is for SMB.
The concept behind this is to target our answers, and be
stealthier on the network. This also helps to ensure that we
don't break legitimate NBT-NS behavior. You can set the -r
option via command line if you want to answer to the
Workstation Service request name suffix

The basic command for Responder to run this tool in Linux is “responder -I
eth0 -w -r -f” or “responder -I eth0 -wrf”, both are the same command
function. And this is the result from Responder tool.
Cyber Attack Practices
Cyber attack practices are malicious actions or techniques used by cybercriminals or hackers to gain
unauthorized access to computer systems, networks, or devices with the intention of stealing or
compromising sensitive information, disrupting services, or causing damage to the target.
Infographic Style

Contents Title Contents Title

You can simply impress your audience You can simply impress your audience
and add a unique zing and appeal to your and add a unique zing and appeal to your
Presentations. Easy to change colors, Presentations. Easy to change colors,
photos and Text. photos and Text.

Contents Title Contents Title

You can simply impress your audience You can simply impress your audience
and add a unique zing and appeal to your and add a unique zing and appeal to your
Presentations. Easy to change colors, Presentations. Easy to change colors,
photos and Text. photos and Text.
Payloads : Reverse Vs Bind
Payload refers specifically to the A reverse payload, also known as a A bind payload, also known as a
part of a malware or virus that reverse shell, is a type of payload
used in a cyber attack that allows an
bind shell, is a type of payload
used in a cyber attack that allows
carries out the malicious attacker to gain control of a victim's
computer or device by establishing a
an attacker to gain control of a
victim's computer or device by
actions. For example, a payload connection from the victim's
computer to the attacker's computer.
creating a listening port on the

in a ransomware attack might


victim's computer or device and
A reverse payload typically involves a waiting for the attacker to connect

be the encryption code that command-and-control (C&C) server to it.


that the attacker controls. The In a bind payload attack, the
locks the victim's files, while a attacker sends a payload to the
victim's computer or device, which
attacker sends a payload to the
victim's computer or device that
payload in a keylogger attack then establishes a connection back to
the C&C server. Once the connection
creates a listening port on a
specific network address and port
might be the code that records is established, the attacker can
execute commands on the victim's
number. The attacker then
connects to this port from their
and sends keystrokes to a computer or device, such as
accessing files, installing malware, or own computer, establishing a

remote attacker. taking other malicious action connection with the victim's
computer.
Reverse payloads can be used in a The advantage of a bind payload
variety of cyber attacks, such as in is that it allows the attacker to
remote access trojans (RATs), gain control of a victim's
botnets, and other types of malware. computer or device even if the
They are a common tool used by victim's network is behind a
hackers and cybercriminals to gain
firewall or other security
unauthorized access to computer
systems and networks.
measures that block incoming
connections. By creating a
listening port on the victim's
computer, the attacker can
establish a connection from
outside the network, bypassing
THANK YOU
Regards : Shreyash Shukla

You might also like