Professional Documents
Culture Documents
Tools and Methods used in Cyber Crime: Introduction, Proxy Servers and Anonymizers, Phishing,
Password Cracking, Key loggers and Spywares, Virus and Worms, Trojan horses and Backdoors,
Steganography, DoS and DDoS attacks.
Phishing and Identity Theft: Introduction, Phishing, Identity Theft (ID Theft).
Phishing
Phishing is a deceptive online tactic that involves sending fake messages, often posing as legitimate
entities like banks or businesses, to trick users into revealing personal and financial information.
These messages can also infect systems with viruses and lead to online identity theft. Phishers, or
criminals behind phishing attacks, follow a systematic process:
1. Planning: Phishers select a target, such as a specific business or individual, and gather email
addresses using mass mailing and other spam-like techniques.
2. Setup: Once the target and victims are identified, phishers create methods, including email
messages and fake webpages, to deliver the phishing attack.
3. Attack: Phishers send deceptive messages, appearing authentic, to lure users into providing
sensitive information.
4. Collection: Phishers record the information entered by victims on fake webpages or pop-up
windows.
5. Identity Theft and Fraud: The stolen information is then used for illegal activities, such as making
unauthorized purchases or committing fraud. Phishing has evolved from its roots in hacking culture,
with an increasing number of organizations providing online access, making it a global threat for
personal information and identity theft.
Password Cracking
A password serves as a key for accessing computerized systems, akin to a lock.
Password cracking is the process of recovering passwords from stored or transmitted data,
often involving repeated guesses by attackers.
The purposes of password cracking include recovering forgotten passwords, checking system
security by administrators, and gaining unauthorized access.
Manual password cracking involves attempting to log in with various passwords, targeting a
valid user account and systematically ranking and trying different passwords until success.
Guessable passwords often involve personal information, such as names, birthdates, or
common words like "password."
Automated scripts can be created for password cracking but are time-consuming and less
effective.
Passwords are stored in a database using one-way functions, like encryption or cryptographic
hash, for verification during authentication.
Despite cryptographic security, attackers seek hashed passwords to test guesses rapidly using
password cracking tools, compromising the confidentiality of passwords.
Password cracking can be classified into 3 categories: online attacks, offline attacks, non-
electronic attacks.
Software Keylogger
Software keyloggers are programs installed on computer systems, typically positioned
between the operating system and keyboard hardware, capturing and recording every
keystroke.
They are stealthily installed by Trojans or viruses without the user's knowledge.
Cybercriminals often target insecure computer systems in public places, like cybercafes or
libraries, to easily obtain sensitive information.
A typical keylogger comprises two files in the same directory: a dynamic link library (DLL) file
and an executable (EXE) file.
The DLL file is responsible for recording keystrokes, making it a potent tool for unauthorized
access and data theft.
Hardware Keylogger
To install these keyloggers, physical access to the computer system is required.
Hardware keyloggers are small hardware devices.
These are connected to the PC and/or to the keyboard and save every keystroke into a file or
in the memory of the hardware device.
Cybercriminals install such devices on ATM machines to capture ATM Cards' PINs.
Each keypress on the keyboard of the ATM gets registered by these keyloggers.
These keyloggers look like an integrated part of such systems; hence, bank customers are
unaware of their presence.
Antikeylogger
Antikeylogger is a tool that can detect the keylogger installed on the computer system and also can
remove the tool.
1. Firewalls cannot detect the installations of keyloggers on the systems; hence, antikeyloggers can
detect installations of keylogger.
2. This software does not require regular updates of signature bases to work effectively such as other
antivirus and antispy programs; if not updated, it does not serve the purpose, which makes the users
at risk.
3. Prevents Internet banking frauds. Passwords can be easily gained with the help of installing
keyloggers.
Spywares
Spyware is a form of malicious software that secretly collects information about users
without their knowledge.
It is often discreetly installed on personal computers, hidden from the user.
In some cases, owners intentionally install spyware, like keyloggers, on shared or public
computers to monitor other users.
Beyond simple monitoring, spyware gathers personal information such as internet surfing
habits and visited websites.
It can also redirect internet activities and alter computer settings, leading to issues like
slowed internet speed.
Anti-spyware software is available to counteract these threats, becoming a common practice
in computer security to protect against the troublesome effects of spyware.