cyber crime evolution
DESCRIPTION
Cyber Crime Evolution & Ethical Hacking. a) Statistics of Internet b) What is Cyber Crime c) Types of Cyber Crime d) Who are Hackers e) Effects of Hacking f) Definitions of Hackers g) Types of Hackers h) Skills of Ethical Hackers i) ContactTRANSCRIPT
![Page 1: Cyber crime evolution](https://reader036.vdocuments.site/reader036/viewer/2022062617/54c8aca94a79598e7f8b45df/html5/thumbnails/1.jpg)
Cyber Crime Evolution & Ethical Hacking
By, Cyber Octet Contact: +91-9824435293Cyber Octet Pvt. Ltd. (Ahmedabad)
Cyber Octet
![Page 2: Cyber crime evolution](https://reader036.vdocuments.site/reader036/viewer/2022062617/54c8aca94a79598e7f8b45df/html5/thumbnails/2.jpg)
Cyber Octet
Falgun Rathod
Ethical Hacker
Penetration Tester
DIE HARD Entrepreneur
Worked for Various GOVT Agencies
Managing Director @ Cyber Octet Pvt. Ltd.
Who am I
![Page 3: Cyber crime evolution](https://reader036.vdocuments.site/reader036/viewer/2022062617/54c8aca94a79598e7f8b45df/html5/thumbnails/3.jpg)
Cyber Octet
What is happening when we connect to internet
Lets See
![Page 4: Cyber crime evolution](https://reader036.vdocuments.site/reader036/viewer/2022062617/54c8aca94a79598e7f8b45df/html5/thumbnails/4.jpg)
Cyber Octet
Packet 1 When We Try Connecting to Internet ,ARP Broadcasting is done on network Who has 192.168.1.1 Tell 192.168.12.13 to get Default Gateway
Packet 2 Default Gateway (Router) Receives the ARP and Assign MAC Address so that now All Packets are sent through this Default Gateway.
Packet 3 When We try to connect with www.google.com DNS Query sent to know the IP Address of www.google.com in WEB know one knows www.google.com.
Packet 4 DNS Replies with the IP address of www.google.com
Packet 5 SYN Packet is sent to www.google.com on a particular port here is 80 i.e. HTTP
Packet 6 ACK/SYN are sent back to IP Address which asked for www.google.com
Packet 7 ACK is received and finally the Three Way Handshaking Process is Completed
Packet 8 Here now You will be getting HTTP Response and able to open the site
Packet 9 All the Data and Images from the Website is been loaded on your Browser
![Page 5: Cyber crime evolution](https://reader036.vdocuments.site/reader036/viewer/2022062617/54c8aca94a79598e7f8b45df/html5/thumbnails/5.jpg)
Cyber Octet
Lets See Some Statistics
![Page 6: Cyber crime evolution](https://reader036.vdocuments.site/reader036/viewer/2022062617/54c8aca94a79598e7f8b45df/html5/thumbnails/6.jpg)
Cyber Octet
![Page 7: Cyber crime evolution](https://reader036.vdocuments.site/reader036/viewer/2022062617/54c8aca94a79598e7f8b45df/html5/thumbnails/7.jpg)
Cyber Octet
![Page 8: Cyber crime evolution](https://reader036.vdocuments.site/reader036/viewer/2022062617/54c8aca94a79598e7f8b45df/html5/thumbnails/8.jpg)
Cyber Octet
What Is Cyber Crime Cybercrime is criminal activity done using computers and the Internet. This includes anything from downloading illegal music
files to stealing millions of dollars from online bank accounts. Cybercrime also includes non-monetary offenses, such as creating and distributing viruses on other computers or posting confidential business information on the Internet
![Page 9: Cyber crime evolution](https://reader036.vdocuments.site/reader036/viewer/2022062617/54c8aca94a79598e7f8b45df/html5/thumbnails/9.jpg)
Cyber Octet
Cyber Crime Rising In The World Fears about the consequences of cyber attacks, internet hacking and identity fraud are at their highest level in five years, with Australians ranking as among some of most concerned people in the world.
The latest annual survey has shown there has been a large jump in the number of people worried that their personal details held by banks, financial providers and telcos, may fall into the wrong hands
![Page 10: Cyber crime evolution](https://reader036.vdocuments.site/reader036/viewer/2022062617/54c8aca94a79598e7f8b45df/html5/thumbnails/10.jpg)
Cyber Octet
India has 42 millions cyber crime victims every year
India lost Rs 34,200 crore to cybercrime last year
In 2012 42 Million People fell victim to Cyber Crime in India and Loss of 8 Billion US Dollars. According to Report of Norton 66% Adults of India has experienced Cyber Crime in their Lifetime. 115000 victims everyday or 80 victims in a minute.
Cyber criminals targeted users of Skype, Facebook and Windows using multiple Exploits in October, according to the latest threat report from security firm GFI Software
Cyber Crime Rising In The World
![Page 11: Cyber crime evolution](https://reader036.vdocuments.site/reader036/viewer/2022062617/54c8aca94a79598e7f8b45df/html5/thumbnails/11.jpg)
Cyber Octet
• PHISHING• DENIAL OF SERVICE ATTACK• SOFTWARE PIRACY• CREDIT CARD FRAUD• CYBER STALKING• WEBSITE DEFACEMENT
Types Of Cyber Crime
![Page 12: Cyber crime evolution](https://reader036.vdocuments.site/reader036/viewer/2022062617/54c8aca94a79598e7f8b45df/html5/thumbnails/12.jpg)
Cyber Octet
Types Of Cyber Crimes
Phishing
It is technique of pullingOut confidentialinformation from thebank/financialInstitutionalaccount holders byDeceptive means.
![Page 13: Cyber crime evolution](https://reader036.vdocuments.site/reader036/viewer/2022062617/54c8aca94a79598e7f8b45df/html5/thumbnails/13.jpg)
Cyber Octet
Types Of Cyber Crimesc
Denial Of Service AttackThis is an act by the criminal, who floods the band width of the
victim’sNetwork or fills his e-mail box with spam mail depriving him of theservices he is entitled to access or provide.
![Page 14: Cyber crime evolution](https://reader036.vdocuments.site/reader036/viewer/2022062617/54c8aca94a79598e7f8b45df/html5/thumbnails/14.jpg)
Cyber Octet
Types Of Cyber CrimesSOFTWARE PIRACY
Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original. Retail revenue losses world wide are ever increasing due to this crimeCan be done in various ways such as end user copying, hard disk loading, Counterfeiting, Illegal downloads from the internet etc
![Page 15: Cyber crime evolution](https://reader036.vdocuments.site/reader036/viewer/2022062617/54c8aca94a79598e7f8b45df/html5/thumbnails/15.jpg)
Cyber Octet
Types Of Cyber Crimes
CREDIT CARD FRAUDYou simply have to type credit card number into www page off thevendor for online transaction If electronic transactions are not
securedthe credit card numbers can be stolen by the hackers who can misusethis card by impersonating the credit card owner..
![Page 16: Cyber crime evolution](https://reader036.vdocuments.site/reader036/viewer/2022062617/54c8aca94a79598e7f8b45df/html5/thumbnails/16.jpg)
Cyber Octet
Types Of Cyber Crimes
CYBER STALKINGThe Criminal follows the victim by sending emails, entering the chatrooms frequently.
![Page 17: Cyber crime evolution](https://reader036.vdocuments.site/reader036/viewer/2022062617/54c8aca94a79598e7f8b45df/html5/thumbnails/17.jpg)
Cyber Octet
Types Of Cyber Crimes
CREDIT CARD FRAUDYou simply have to type credit card number into www page off thevendor for online transaction If electronic transactions are not
securedthe credit card numbers can be stolen by the hackers who can misusethis card by impersonating the credit card owner..
![Page 18: Cyber crime evolution](https://reader036.vdocuments.site/reader036/viewer/2022062617/54c8aca94a79598e7f8b45df/html5/thumbnails/18.jpg)
Cyber Octet
TimeLine
Cost of Resources
Availability of Resources
1965 1975 1995 2005
Soldiers New Tech
Cruise Missile
1945 Today
MissilesICBM & SLBM
StrategicNuclear
Weapons
Precision
Guided
Munitions
![Page 19: Cyber crime evolution](https://reader036.vdocuments.site/reader036/viewer/2022062617/54c8aca94a79598e7f8b45df/html5/thumbnails/19.jpg)
Cyber Octet
Who Are Cyber Criminals
Mostly Insiders,Crackers,Foreign Intelligence,Terrorist & Hackers
![Page 20: Cyber crime evolution](https://reader036.vdocuments.site/reader036/viewer/2022062617/54c8aca94a79598e7f8b45df/html5/thumbnails/20.jpg)
Cyber Octet
1970’s 1980’s 1990’s 2000’s 2010’s
MIT & Stanford Universities Best Programmers
Gamers Game Hacking &
Copyright Breaking Website
Defacement Cyber Criminals
Time line of Hackers
![Page 21: Cyber crime evolution](https://reader036.vdocuments.site/reader036/viewer/2022062617/54c8aca94a79598e7f8b45df/html5/thumbnails/21.jpg)
Cyber Octet
Why Security?
![Page 22: Cyber crime evolution](https://reader036.vdocuments.site/reader036/viewer/2022062617/54c8aca94a79598e7f8b45df/html5/thumbnails/22.jpg)
Cyber Octet
Damage to information & theft of information.
Attackers may also use these PCs as "spam zombies" or "spam bots“.
Attackers use backdoors such as Trojan horses, root kits, virus & worms to compromise systems.
Theft/damage of clients or customer/business data, credit card details, and social security numbers, for identity fraud or theft.
Theft of email addresses for spamming, passwords for access to online banking, ISP or web services.
Effects of Hacking
![Page 23: Cyber crime evolution](https://reader036.vdocuments.site/reader036/viewer/2022062617/54c8aca94a79598e7f8b45df/html5/thumbnails/23.jpg)
Cyber Octet
Hacking into government systems or servers or network can affect its operations & reputation.
Hacking into company will affect its asset & goodwill.
Effect of Hacking
![Page 24: Cyber crime evolution](https://reader036.vdocuments.site/reader036/viewer/2022062617/54c8aca94a79598e7f8b45df/html5/thumbnails/24.jpg)
Cyber Octet
Case Study Of GoogleA British researcher, Jim Ley, discovered (2004) an XSS flaw in Google and provided this proof of concept Phishing page where Google becomes a ‘paying service’. If you would be so kind as to provide your credit card details . Now fixed.
![Page 25: Cyber crime evolution](https://reader036.vdocuments.site/reader036/viewer/2022062617/54c8aca94a79598e7f8b45df/html5/thumbnails/25.jpg)
Cyber Octet
![Page 26: Cyber crime evolution](https://reader036.vdocuments.site/reader036/viewer/2022062617/54c8aca94a79598e7f8b45df/html5/thumbnails/26.jpg)
Cyber Octet
A hacker is someone who gains unauthorized access to a computer system. Many hackers just like the challenge of breaking through a computer security system.
The terms Hackers and Hacking are being misinterpreted and misunderstood with negative sidelines.
Definition of Hackers?
![Page 27: Cyber crime evolution](https://reader036.vdocuments.site/reader036/viewer/2022062617/54c8aca94a79598e7f8b45df/html5/thumbnails/27.jpg)
Cyber Octet
Hackers Crackers
Script Kiddies
Phreakers
Types of Hackers
![Page 28: Cyber crime evolution](https://reader036.vdocuments.site/reader036/viewer/2022062617/54c8aca94a79598e7f8b45df/html5/thumbnails/28.jpg)
Cyber Octet
Hackers are the person who tries to break into computer system to get secret information.
Motive/Intent –
To gain in-depth knowledge of a system, what’s happening at the backend, behind the screen.
To find possible security vulnerabilities in a system.
They create security awareness by sharing knowledge. It’s a team work.
Hackers
![Page 29: Cyber crime evolution](https://reader036.vdocuments.site/reader036/viewer/2022062617/54c8aca94a79598e7f8b45df/html5/thumbnails/29.jpg)
Cyber Octet
An Individuals who break into computers with malicious intent.
Motive/Intent –
To seek unauthorized access into a system and cause damage or destroy or reveal confidential information.
To compromise the system to deny services to legitimate users for troubling, harassing them or for taking revenge.
Effects- Can cause financial losses & image/reputation damages, defamation in the society for individuals or organizations
Crackers
![Page 30: Cyber crime evolution](https://reader036.vdocuments.site/reader036/viewer/2022062617/54c8aca94a79598e7f8b45df/html5/thumbnails/30.jpg)
Cyber Octet
Phreaks – These are persons who use computer devices and software to break into phone networks.
Motive/Intention- To find loopholes in security in phone network and to make phone calls at free of cost!!!
Effects- You may have to big amount of phone bills, for doing nothing!!!
Phreakers
![Page 31: Cyber crime evolution](https://reader036.vdocuments.site/reader036/viewer/2022062617/54c8aca94a79598e7f8b45df/html5/thumbnails/31.jpg)
Cyber Octet
Script Kiddies – These are persons not having technical skills to hack computers.
Motive/Intention- They use the available information about known vulnerabilities to break into remote systems.
It’s an act performed for a fun or out of curiosity.
Script Kiddies
![Page 32: Cyber crime evolution](https://reader036.vdocuments.site/reader036/viewer/2022062617/54c8aca94a79598e7f8b45df/html5/thumbnails/32.jpg)
Cyber Octet
Hats of Hackers
![Page 33: Cyber crime evolution](https://reader036.vdocuments.site/reader036/viewer/2022062617/54c8aca94a79598e7f8b45df/html5/thumbnails/33.jpg)
Cyber Octet
•Individuals professing hacker skills & using them for defensive & are also known as security analysts
White Hat Hackers
•Individuals with extraordinary computing skills, resorting to malicious or destructive activities & are also known as crackers
Black Hat Hackers
•Individuals who work both offensive & defensively at various times
Grey Hat Hackers
![Page 34: Cyber crime evolution](https://reader036.vdocuments.site/reader036/viewer/2022062617/54c8aca94a79598e7f8b45df/html5/thumbnails/34.jpg)
Cyber Octet
Reconnaissance
ScanningGaining Access
Maintaining
Access
Clearing Tracks
Hackers Strategies
![Page 35: Cyber crime evolution](https://reader036.vdocuments.site/reader036/viewer/2022062617/54c8aca94a79598e7f8b45df/html5/thumbnails/35.jpg)
Cyber Octet
The Hacker who has Right from Concern Authority of Government Body to Hack are known as Ethical Hacker.
Who is Ethical Hacker
![Page 36: Cyber crime evolution](https://reader036.vdocuments.site/reader036/viewer/2022062617/54c8aca94a79598e7f8b45df/html5/thumbnails/36.jpg)
Cyber Octet
Platform
Knowledge
•Having depth knowledge of Windows, Unix & LinuxComp
uter Expert
•Should be a computer expert adept at technical solutionSecurit
y Knowle
dge
•Has knowledge of security areas & related issues
Skills of an Ethical Hacker
![Page 37: Cyber crime evolution](https://reader036.vdocuments.site/reader036/viewer/2022062617/54c8aca94a79598e7f8b45df/html5/thumbnails/37.jpg)
Cyber Octet
Network
Knowledge
•Has exemplary knowledge of networking and related software & hardwareTechnic
al Knowle
dge
•Has high technical knowledge to launch the sophisticated attacks
Skills of an Ethical Hacker
![Page 38: Cyber crime evolution](https://reader036.vdocuments.site/reader036/viewer/2022062617/54c8aca94a79598e7f8b45df/html5/thumbnails/38.jpg)
Cyber Octet
What are Virus Properties of Virus What are Worms Properties of Worms What are Trojans Properties of Trojan
Virus , Worms & Trojans
![Page 39: Cyber crime evolution](https://reader036.vdocuments.site/reader036/viewer/2022062617/54c8aca94a79598e7f8b45df/html5/thumbnails/39.jpg)
Cyber Octet
Authentication Bypass
Sql Injection
XSS
CSRF
Website Hacking
![Page 40: Cyber crime evolution](https://reader036.vdocuments.site/reader036/viewer/2022062617/54c8aca94a79598e7f8b45df/html5/thumbnails/40.jpg)
Cyber Octet
Questions
![Page 41: Cyber crime evolution](https://reader036.vdocuments.site/reader036/viewer/2022062617/54c8aca94a79598e7f8b45df/html5/thumbnails/41.jpg)
Cyber Octet
Thank You
The End
![Page 42: Cyber crime evolution](https://reader036.vdocuments.site/reader036/viewer/2022062617/54c8aca94a79598e7f8b45df/html5/thumbnails/42.jpg)
Cyber Octet
www.facebook.com/cyberoctet
www.facebook.com/selfaccelerate
www.cyberoctet.in
Contact