Intro to Cyber Security - Basics
Total Page:16
File Type:pdf, Size:1020Kb
INTRO TO CYBER SECURITY - BASICS Easy Cyber Sec - The Best Cybersecurity Training in your language www.easycybersec.com Phone: +91 – 9597723169 WhatsApp: +91 – 9791956182 www.easycybersec.com Join us today for the best hacking course Phone: +91 – 9597723169 WhatsApp: +91 – 9791956182 This book aims to introduce you to the basic concepts of ethical hacking & cybersecurity. As the title says, this is just an informational book, for more detailed contents and learning join us at Easy Cyber Sec. 1 www.easycybersec.com Join us today for the best hacking course Phone: +91 – 9597723169 WhatsApp: +91 – 9791956182 Contents Introduction .................................................................................................................................................. 6 How Seriously Should You Take Threats to Network Security? ................................................................ 7 Threats, Vulnerability, Attacks .................................................................................................................. 9 Vulnerabilities ....................................................................................................................................... 9 Threats ................................................................................................................................................ 12 Exploits ................................................................................................................................................ 13 Pivoting ............................................................................................................................................... 14 Statistics .................................................................................................................................................. 15 Malwares..................................................................................................................................................... 17 Case Study ............................................................................................................................................... 17 Introduction ............................................................................................................................................ 23 Malware .................................................................................................................................................. 24 Why They Want Your Workstation ..................................................................................................... 25 Intent Is Hard To Detect ...................................................................................................................... 26 It’s A Business ...................................................................................................................................... 27 Elk Cloner ............................................................................................................................................ 29 A Brief History Of Malware ................................................................................................................. 31 Computer Virus ....................................................................................................................................... 35 Attack Phase ........................................................................................................................................ 37 Boot Sector Virus ................................................................................................................................ 38 Macro Virus ......................................................................................................................................... 40 Executable Infectors............................................................................................................................ 41 Multipartite Virus ................................................................................................................................ 43 Encrypted Virus ................................................................................................................................... 44 Polymorphic Viruses ........................................................................................................................... 44 Sparse Infector Virus ........................................................................................................................... 45 Spacefiller Virus................................................................................................................................... 45 Batch Files ........................................................................................................................................... 46 Worm ...................................................................................................................................................... 48 Trojan Horse ............................................................................................................................................ 54 Bots, Botnets and Zombies ..................................................................................................................... 68 2 www.easycybersec.com Join us today for the best hacking course Phone: +91 – 9597723169 WhatsApp: +91 – 9791956182 Logic bombs ............................................................................................................................................ 71 Adware .................................................................................................................................................... 73 Spyware ................................................................................................................................................... 74 Rogue Security Software ......................................................................................................................... 77 Keyloggers ............................................................................................................................................... 78 Form Grabbing ........................................................................................................................................ 81 Typosquatting ......................................................................................................................................... 82 Spoofing .................................................................................................................................................. 82 Phishing ................................................................................................................................................... 85 Spamming ............................................................................................................................................... 88 Sniffing .................................................................................................................................................... 89 Pharming ................................................................................................................................................. 89 Man-in-the-Middle.................................................................................................................................. 90 Repudiate ................................................................................................................................................ 90 Zero Day Vulnerability............................................................................................................................. 91 Ransomware ............................................................................................................................................... 92 Denial of service ........................................................................................................................................ 106 Ping Flood Attack .............................................................................................................................. 108 Smurf Attack ..................................................................................................................................... 109 Ping of Death ..................................................................................................................................... 110 SYN flood ........................................................................................................................................... 111 Distributed Denial of Service ............................................................................................................ 113 Advanced Persistent Threats .................................................................................................................... 114 What is an APT? .................................................................................................................................... 115 How relevant are APTs? ........................................................................................................................ 116 How do APT attacks work? ................................................................................................................... 116 Phase 1: Incursion ............................................................................................................................