KEMBAR78
Cybersecurity Essentials - Part 2 | PPTX
Cybersecurity
Essentials
Presented by Shobhit Sharma
TOC
Overview
Types of Hackers
WannaCry : A case study
Password Cracking
What is Password Cracking?
A cyber-attack is one in which criminals try to hack
the passwords of the victims.
Types of Attacks
➔ Dictionary Attack
➔ Brute Force Attack
➔ Rainbow Table Attack
➔ Phishing
➔ Social Engineering
➔ Malware
➔ Offline Password Cracking
➔ Keylogger
➔ Guessing The Passwords
Dictionary Attack
In this attack, criminals use words that are common passwords.
Criminals use simple documents that have all the common words
which users can possibly use as their passwords.
Brute Force Attack
Criminals use all the possible combinations of alphanumeric
characters. This attack is very time consuming as criminals have to
use different combinations one by one.
Rainbow Table Attack
Instead of comparing passwords directly and then comparing its hash
to crack it, this method uses a rainbow table which is the list of
precomputed hashes. Password is cracked using its hashed value. In
this hash value of the password is compared.
Phishing
In this technique attackers send malicious emails that redirect users
to fake websites to trick them into entering their personal
information and other important details. It is an easy way to hack, as
criminals need to send email to the potential victims and wait for
them to become a victim.
Social Engineering
Attackers will pose as tech guys or representatives of a genuine
organization and then ask for important information. This trick works
very well as victims generally give all the information easily.
Malware
Malware is a malicious software which steals information from the
user’s system and sends it to criminals. Malware can be installed on
the user’s system by various methods and once it is installed it starts
stealing the information.
Offline Password Cracking
In offline password cracking attackers attack on a third party on
which passwords are stored in a file. Once the criminals have access
to these files they start cracking it on their own machine.
Keylogger
Keylogger is a type of a malicious program which tracks all the
keystrokes of the user’s system. Everything that user type will be
recorded and then sent to the attackers.
Guessing The Passwords
Most simple technique to hack a password is guessing it. Criminals
take note of the user’s activity to guess passwords, this technique
only works when users have not used any password creating
software.
How To Be Secured?
● Most common techniques that hackers use is phishing and
malware.
● Passwords should be strong, unique and long for better security
● Users have to be self-aware and be safe from falling into the
scams.
● Use 2 Factor Authentication
● Change Password in a short time period
● Never store your passwords or information in a flat file

Cybersecurity Essentials - Part 2

  • 1.
  • 2.
    TOC Overview Types of Hackers WannaCry: A case study Password Cracking
  • 3.
    What is PasswordCracking? A cyber-attack is one in which criminals try to hack the passwords of the victims.
  • 4.
    Types of Attacks ➔Dictionary Attack ➔ Brute Force Attack ➔ Rainbow Table Attack ➔ Phishing ➔ Social Engineering ➔ Malware ➔ Offline Password Cracking ➔ Keylogger ➔ Guessing The Passwords
  • 5.
    Dictionary Attack In thisattack, criminals use words that are common passwords. Criminals use simple documents that have all the common words which users can possibly use as their passwords.
  • 6.
    Brute Force Attack Criminalsuse all the possible combinations of alphanumeric characters. This attack is very time consuming as criminals have to use different combinations one by one.
  • 7.
    Rainbow Table Attack Insteadof comparing passwords directly and then comparing its hash to crack it, this method uses a rainbow table which is the list of precomputed hashes. Password is cracked using its hashed value. In this hash value of the password is compared.
  • 8.
    Phishing In this techniqueattackers send malicious emails that redirect users to fake websites to trick them into entering their personal information and other important details. It is an easy way to hack, as criminals need to send email to the potential victims and wait for them to become a victim.
  • 9.
    Social Engineering Attackers willpose as tech guys or representatives of a genuine organization and then ask for important information. This trick works very well as victims generally give all the information easily.
  • 10.
    Malware Malware is amalicious software which steals information from the user’s system and sends it to criminals. Malware can be installed on the user’s system by various methods and once it is installed it starts stealing the information.
  • 11.
    Offline Password Cracking Inoffline password cracking attackers attack on a third party on which passwords are stored in a file. Once the criminals have access to these files they start cracking it on their own machine.
  • 12.
    Keylogger Keylogger is atype of a malicious program which tracks all the keystrokes of the user’s system. Everything that user type will be recorded and then sent to the attackers.
  • 13.
    Guessing The Passwords Mostsimple technique to hack a password is guessing it. Criminals take note of the user’s activity to guess passwords, this technique only works when users have not used any password creating software.
  • 14.
    How To BeSecured? ● Most common techniques that hackers use is phishing and malware. ● Passwords should be strong, unique and long for better security ● Users have to be self-aware and be safe from falling into the scams. ● Use 2 Factor Authentication ● Change Password in a short time period ● Never store your passwords or information in a flat file