Professional Documents
Culture Documents
UNIT 2
Content
Web jacking
Online Frauds
Software Piracy
Computer Network Intrusions
Password Sniffing
Identity Theft
Web jacking
This term is derived from the term hi jacking. In these kinds
of offences the hacker gains access and control over the web
site of another.
He may even change the information on the site. This may be
done for fulfilling political objectives or for money. E.g.
recently the site of MIT (Ministry of Information Technology)
was hacked by the Pakistani hackers and some obscene matter
was placed therein.
Further the site of Bombay crime branch was also web jacked.
Another case of web jacking is that of the ‘gold fish’ case. In
this case the site was hacked and the information pertaining to
gold fish was changed.
Web jacking
The other form is using the ‘Brute Force’. In this attack the
software tries to guess the password by trying all possible
combination of numbers, symbols, letters till the correct
password is found.
Example
In an incident reported in the USA, the owner of a hobby
website for children received an e-mail informing her that a
group of hackers had gained control over her website.
It is a personal property.
It is based on information.
Why IP protection is given
(1)If you are a fan of siting in public cafes that offer free WIFI and
playing on your computer. Make sure you are using sort of
encryption and security when sending passwords.
A person who has a password sniffing program on their
computer can easily sit in a public space collecting passwords
from the network with ease. These programs are simple to
use.
(2)In a Mall all people are shopping using there smartcard, credit
card , debit card etc. at the time of payment customer have to
stretch their card into machine. In that machine the attacker can
use program to record the user password or sensitive
information. And after gaining particular information attacker can
misuse the card and amount.
Case Study
Insider Attack.
Social Engineering.
Virus Infiltration.
Denial of Service.
Software Bug.
Password Infiltration.
IP Spoofing.
Trojan Horse.
Brute Force.
Worms and viruses
HACKER CATEGORIES
Semi-Professional Hacking: Performed part-time and does not provide an
income.
They fit the classical hacker characteristics i.e. they work and play on
the edge of society, have a gang mentality, strong negative responses to
threats against his/her self-esteem, can have narcissistic personality
disorders.
[Instructors note: One reporter critical of hackers was reputedly to have been
sentenced to "electronic death". Hackers had his telephone, gas, and electricity
turned off, flooded him with unordered mail-order merchandise and posted his credit
report on public BBS]