EHF Module 1 Final
EHF Module 1 Final
1. Compare active attacks vs Passive attacks. Classify the cybercrimes and explain any one
briefly.
1. Active Attacks
Definition: In active attacks, the attacker actively interferes with the system or network to
disrupt its normal operation.
Goal: The aim is to change or damage the system's data, services, or network.
Characteristics:
o Modification of data (e.g., altering files, commands, etc.)
o Denial of Service (DoS) or Disruption (e.g., crashing a website)
o Requires immediate interaction (e.g., inserting malware, injecting data).
Examples:
o Man-in-the-Middle Attack: An attacker intercepts and alters communication
between two parties.
o Denial of Service (DoS): The attacker floods the system with too much traffic,
causing a crash.
2. Passive Attacks
Definition: In passive attacks, the attacker does not interfere with the system but silently
monitors or eavesdrops on the network traffic or system.
Goal: The aim is to gather information without detection, which may be used later for
malicious purposes.
Characteristics:
o No change or disruption to the data or system.
o Monitoring network traffic, collecting passwords, or reading sensitive information.
o No immediate impact on the system’s performance.
Examples:
o Eavesdropping on network traffic to steal passwords or other sensitive data.
o Traffic Analysis: The attacker listens to or monitors network data without altering it.
1. Hackers
Hackers are individuals who gain unauthorized access to computer systems. However, not all hackers
are bad; some use their skills to improve cybersecurity.
Types of Hackers
⚠ Sometimes break into systems without permission but don’t harm them.
⚠ May inform the company about security flaws after hacking.
⚠ Example: A hacker finds a bug in an app and informs the developer.
2. Crackers
Crackers are criminal hackers who break into systems to harm, steal, or destroy data. They focus on
cracking security measures like passwords and software protection.
Crackers are people who hack into computers and networks without permission. They break security
to steal, damage, or destroy important data. Some remove protections from software to use it for
free, while others spread harmful programs like viruses and ransomware.
Many crackers focus on stealing money by hacking bank accounts or credit card details. Their actions
cause big financial and security problems. Police and cyber experts work to catch and stop them to
keep people and businesses safe.
🔹 Example: A cracker removes copy protection from paid software and shares it for free.
Black Hat Hackers – Hack systems illegally to steal data or cause harm.
Cyber Criminals – Hackers involved in financial fraud, identity theft, and ransomware.
Phreakers are telephone hackers who manipulate telecom systems to make free calls or break into
communication networks.
Phreakers are hackers who exploit telephone networks to make free calls by manipulating telecom
signals. Before the internet era, phreaking was a popular practice, allowing individuals to bypass
billing systems. Some phreakers also broke into voicemail systems or stole data from phone networks.
In modern times, phreaking has evolved to target mobile networks, but many traditional techniques
are now illegal and outdated. While telecom security has improved, some vulnerabilities still exist,
making phone networks a target for hackers.
🔹 Example: A phreaker hacks a telecom system to make long-distance calls without paying.
Black Hat Hackers – Some black hat hackers specialize in breaking into telecom networks.
Script Kiddies (Phreaking Tools) – Use pre-made tools to exploit telecom systems.
Hacktivists (Sometimes) – Some hacktivists hack telecom networks for political messages.
3. What are the primary goals of ethical hacking and what are its phases?
Ethical hacking, also known as penetration testing, is the process of breaking into computer systems
or networks (with permission) to find and fix weaknesses that attackers could exploit.
In simple terms, ethical hackers look for loopholes in systems that bad hackers might use to steal
data, cause financial loss, or harm the system.
The main goal of ethical hacking is to strengthen security by identifying and fixing these
vulnerabilities.
Ethical hackers use the same tools and techniques as malicious hackers, but they do it with proper
approval and for the purpose of protecting the systems.
After testing, ethical hackers share their findings with the management, helping them understand
the risks and fix the issues to prevent future attacks.
✅ Primary Goals of Ethical Hacking
4. Test Defenses
– Pretend to be an attacker and try to break in.
– Example: Running a fake “phishing” email campaign to see if employees fall for it.
6. Train People
– Teach staff how to spot scams and stay safe online.
– Example: Showing employees what a fake login page looks like.
What it is: This is the first step, where the hacker collects information about the target
(system or network).
2. Scanning
What it is: The hacker looks for vulnerabilities or weaknesses in the system or network that
they can use to break in.
Types of scanning:
o Port Scanning: Finding open ports and services running on the target.
o Vulnerability Scanning: Looking for weaknesses that can be exploited, often using
automated tools.
o Network Mapping: Mapping out the network’s layout, including routers, firewalls,
servers, etc.
3. Gaining Access
How it’s done: After getting in, the hacker tries to gain admin privileges so they can make
changes, install programs, or hide their tracks.
4. Maintaining Access
What it is: The hacker keeps control over the system even after getting in.
How it’s done: The hacker may install malicious software (like Trojans or rootkits) to stay
connected to the system secretly, without the user knowing.
5. Clearing Tracks
What it is: The hacker removes any evidence of their activity to avoid getting caught.
How it’s done: This could involve deleting logs, modifying system files, and uninstalling any
tools or software used during the hack.
6. Reporting
What it is: The final step where the hacker writes a report.
What’s included: The report includes details about the test, tools used, vulnerabilities found,
and how the attack was carried out. This helps the organization improve security.
It involves hacking, stealing data, spreading viruses, and other harmful actions that target individuals,
organizations, or governments.
Cyber Stalking – Harassing someone online through messages, emails, or social media.
Phishing – Tricking people into sharing sensitive information like passwords and bank details.
Online Scams & Fraud – Fake websites or emails used to steal money.
Example: You receive an email pretending to be from your bank, asking you to click on a link and
enter your login details. If you enter your details, hackers steal your banking credentials and misuse
them.
These involve damaging or stealing digital assets like files, money, or intellectual property.
Offences against cvonfid3ntilty, integrity and availability of computer data and system.
Types:
Virus & Malware Attacks – Spreading harmful software that damages or steals data.
Ransomware Attacks – Locking a person’s files and demanding money to unlock them.
Illegal Interception – it means secrtly capturing or listening to data while it is being sent
Example: You download a file from an untrusted website, and suddenly, all your files are locked. A
message appears demanding money (ransom) to unlock your data. If you don’t pay, you lose access
to your files.
Financial Cybercrime – Stealing money through online banking fraud or stock market
manipulation.
Cyber laundering – act of electronically transferring black money without rvealing the source
and possibly destination
Example: Hackers flood a government website with excessive traffic, making it crash and
become unavailable to the public. This disrupts services and creates chaos
Hackers are individuals who explore computer systems and networks in different ways.
Depending on their intentions and actions, hackers are categorized into White Hat, Black
Hat, and Grey Hat hackers.
✅ Key Differences
Type of
Purpose Permission Legality Example
Hacker
✅ What Is Malware?
Malware (short for “malicious software”) is any program or code designed to harm, exploit,
or take unauthorized control of computers, networks, or devices.
🎯 Concept of a Virus
A computer virus is a malicious program that can:
1. Attach itself to clean files (like documents or programs).
2. Spread to other files or computers when those files are opened or programs run.
3. Activate to carry out a “payload” (for example, deleting files or displaying annoying
messages).