Académique Documents
Professionnel Documents
Culture Documents
Presented By
Ghanshyam K. Patel
It 5th Sem
Computer Crimes
The public streets and highways of the internet have become like neighborhoods where it is no longer safe to venture. Hackers, scammers, virus builders and other Web predators are looming in the
CODERS: The Real Hackers are the Coders, the ones who revise the methods and create tools that are available in the market.
Admins are the computer guys who use the tools and exploits prepared by the coders. They do not develop their own techniques, however they uses the tricks which are already prepared by the
SCRIPT KIDDIES:
Script Kiddies are the bunnies who use script and programs developed by others to attack computer systems and Networks.
Cyber Terrorist
They are Hackers who are called Cyber Terrorists, who attack government computers or public utility infrastructures, such as power stations and air-traffic-control towers
Web Ripping
Web Ripping is finding and extracting pictures and other media files from specific website URLs and save them to your hard drive.
Google Hacking
Google hacking involves using Advance Search Operators in the Google search engine to locate specific strings of text within search results. Some of the more popular examples are finding specific versions of Vulnerable Web Applications.
SQL Injection
A SQL injection attack exploits vulnerabilities in a web server database that allow the attacker to gain access to the database and read, modify, or delete information.
Types of Attacks
Attacks on computer systems using the computers Web-site defacement or Revealing the data to unauthorized persons/theft of sensitive information/ stealing information like stealing credit card numbers bank frauds or Damage to data through Hacking or Virus/Worms
Types Of Attacks
Hoax Letters: Examples
[continue]
Malicious code (viruses and trojan horses) Urban myths Scam letters to entrap the receiver
Internet gambling Internet Pornography Link Flooding Packet Intercepting, Password Sniffing
Types Of Attacks
[continue]
propagate false routing entries (black holes and sink holes) domain hijacking Phishing attacks: use e-mails that often appear to come from a legitimate e-mail address and include links to spoofed Web addresses. The receiver responds to the link, which takes the receiver to a site, other than what the receiver thinks he is going to. (announced by MS on 16 Dec 2003, as a problem with Internet Explorer).