Professional Documents
Culture Documents
Topics to be cover
Web jacking,
Online Frauds,
Software Piracy,
Computer Network Intrusions,
Password Sniffing,
Identity Theft,
Cyber terrorism,
Virtual Crime,
Perception of cyber criminals: Hackers, insurgents and extremist
group etc.
Web servers hacking,
session hijacking.
Web jacking
Where an attacker can ask for any sensitive data such as credit
card number, username, password etc.
Figure 2.1 Process of Web Jacking
Web Jacking Attack Method
3. The third step is to send the link of a fake page to the victim.
4. The fourth step victim will open the link and enter their
details and submit.
5. Last step, you will get all the details submitted by victim.
There are following sections that will be used during the case
of Web Jacking which are as follows-
Step-1:
So to apply web jacking attack method we will use a tool in
kali linux called setoolkit.
Step-2:
Open your kali linux operating system, and then open
Terminal window.
Step-3:
Type setoolkit on the terminal.
Step-4:
It will display lots of attacking method but you have to select
Social-engineering attack.
How to apply web jacking attack method:
Step-5:
Type 1 to select Social-engineering attack, it will display lots of
social engineering attack method. Here, you have to select website
attack vector, so type 2, it will display different website attack
method.
Above methods will create a fake website page same as victim
website page and host it on your computer.
Step-6:
Copy the link(your computer IP which you entered previously) of
fake website and send it to the victim. If the link is your local
computer IP address then convert it into domain name. To convert
your IP address in domain name, open the link and type your
computer IP address here, it will create a link. Now, your link is
ready copy it and send it to the victim and wait till he/she entered
their details.
How to apply web jacking attack method:
Step-7:
When a victim will open the link in their browser, the
browser display the message “the site www.abc.com has
move on another address, click here to go to the new
location” and if the victim clicks on this link he will get
redirected on the fake webpage.
Online Frauds
All you need to do is just visit our web site by clicking the
link given below and provide your debit or credit card details
to cover shipping and managing costs.
However the item never arrives but after some days the
charges will be shown on your bank account and you will
lose money.
Software piracy
This agreement defines rules for software use and not every
agreement is the same.
1) Softlifting
2) Client-server overuse
3) Hard disk loading
4) Counterfeiting
5) Online Piracy
1). Soft-lifting:
Softlifting
is when someone purchases one version of the
software and downloads it onto multiple computers, even
though the software license states it should only be
downloaded once.
D. Protocol-Specific Attacks:
Protocols such as ARP, IP, TCP, UDP, ICMP, and various
application protocols can inadvertently leave openings for
network intrusions.
E. Covert CGI Scripts: