The document discusses various types of cyber attacks, including phishing, backdoor attacks, and the methods attackers use to manipulate victims. It highlights the importance of mutual authentication and detection measures to prevent such attacks. Additionally, it outlines the tactics employed by attackers to gain unauthorized access and control over systems and sensitive information.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0 ratings0% found this document useful (0 votes)
57 views3 pages
Murli, CSS Assignment
The document discusses various types of cyber attacks, including phishing, backdoor attacks, and the methods attackers use to manipulate victims. It highlights the importance of mutual authentication and detection measures to prevent such attacks. Additionally, it outlines the tactics employed by attackers to gain unauthorized access and control over systems and sensitive information.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 3
[ Assignment “1 J [ess] Monti Nath Jha
a BL be
Shon poles 90’
4. Mar Sn the Nidle Attack (HZIHA)
"Tk Gs a cyber attock where the Otorket _seenelely welays and possi
alhns oe
Communion Hw tHe parties ube behave phat dhe ee
directly Communi(oting with each ofhert, aS Ho atlackor has jnsorte!
dhersclias ibelweern” She wo parchas, One oareph $ MITNA adbhek
ud Oa Secre aoe ety whith dhe otlacke: male in leperclert
Corrections with He vichims & velaus messages blu Sher
male them belie they anc Jaleig BIEN AM diche llops
over G pruvakt conrecher wen srlact esthe ert corvers ashur 15
contnolled Phe ablacker, The ctlacker must de abe
tatermpt “alll nelevert messages posing bh te tuo vid 5 &
foject new Ones-
as Strqigh-femward YA MOY Ssttum stoners. lor &
within the “necephon nanges Gl on i
feted Ged) Setcnest ees es epaic cbs axttlelnd at
OireS 40 sweet mutual authertichin.
*MITHA fan’ be prevent an deleted 40d means awtherHtatioo &
Bepet detection. Aterteotisn peace chee of colada
thad a Bier menage bas ere bor a Jeoihimak sovece. Tan
myer
detechion roy Shows evden 4ho4 Beige sme dolelben
altene »
7 Conifer austen
THTTP heblic hey Plonicg
-7 Mo clericg tenero
9. Phising Attack '— f El
i 3a W ig attack, an attacker gends dhe fraudlerd Cyr spooked), fake °
Cte wise ckcaptie? messa desi. do ‘tide a porn fto a ‘9
sensitive. Fokatrotion do dhe atlacker’ on Jo cleploy malts
Soltwane oF the Victims Yalastctse ike mansemuare . Pur
acs chose cbtteré fntneasing) Sophistioted § oft heanspanonty
mission the Sie berg dangekd , a Llewig dhe atlackert go
Observe every thee while Ihe vichme ig ravigatig Like iP,i troverse any additional security boerdaves ont He vichen.
The Fixst sttoncled vse a athe Herr “Phisicg” rvas Jn she cnockirg
toolkit POMEL create! by Kewilah fekKoUche vin 19.95.
“Aterots Jo 5 f j ic ir
mpts Jo prtvert 07 navigak te fmpack of phising Freiclents intldes
degis (ation , user aed au ae 1enes6 bp $e Bist = ay
MASE. :
“> Zipes oh phisiog \-
Email Presi 5) Voice phis |
DS pear Phisng 6) SHS phisi |
5) whalieg A CEO Fravd D) Pege Nijac hi
4) Clare Pring 8) lercla Phssicg
3) Reerok Bile Fholusiog
Husa ype of veb wieesabiy hod iS Comme feed Jo offectuch —
oplietors that selly ono Scriptirg sun dime his ie is Gus)
wher an applitation builds a pot onewiebe cole sing Or
abtacker cortplte) arabe sn a way thot allous ole attacker
to Conrbol which Pile J exearkd Gr sucrtime - Sterssfully
Gplitable a Fle Foclusise whenabil will oesol so error
alfeckd web oppiatin. An cHlaskerr cor use creole Code entity
fo ciak 6 ueb Geller phe yeb xrven ebb or # caer
webs/t clefecerrert-
AFI inclide wierabilify as distinct Bor a gerenic dicks Aevriel
atlack, 8a dhed dis dravenol Js a wey ining eraut heauses
file aystro access 8 File trclusion tinea uw! cobrents bow
an appreciation ceoads ecde for execerhar.
=7 Sypes 4 Sodlustoo '-
1) Remo File SncbusdO'- Ocaxs when the uch opplitohoO down lecdls
ond Crews Acverok file, Thec memet Glee ane vsvally cbteoe!
sa jhe Rem of an HTTP or (OP ORZ as a wet spe
poramek7 do the ueb appliteden-
‘\ Backdoan Attack '-
a i
Fh eyporsrwaty toms ; 2 backdearr attack is on attmpt Jo fofi Peak a
Systeeo a 0 nelulk by maliunusly Sabiog advan tage of Sofeerre
tak point“Backdoans oiow fre a Hackers
the Sash protoco
CS SPeAPlart
do of ey get into dhe Eyer oy
ie 2 gain Od ministritedive ores. He
de he oreal-Lfe S10 bho.
Adlvardage ob the paphol R
eels (ied Mais rah) la "boclederne
enter? te5 Conclocsheg she elt. 4g : ss
. Alkn Piieg igh Jere) Od minis teadive Percerdege dhe cuberr qthekert
Covbl Porfevwn VOUS desks bile iyjecti
Of Pyware, Joie emok
Aerss, hack she device , Sia! seny'tie Ffermabon, emo he
gystin thyputh mangymunne q mony mone - Backcbans ant onginaly
Mmeors fey epi Sofhoare developens 4 ests
= yes of Bac kedlean '-
) Ad minishative TD Halivos boc ledoorr
"e} Potter Bors dhs atock t cho,
ehwark | keep Frewall OV, Hop;
2) okies Rome busting
A uxh sone pans) COrloie messages to a eg so
thot Abe web server Gem monstr She user's activity ef %
porwr nebsite, the MRSORS ore brow ag Cookies Jt
iS A Sma piece o foferreation Shot 0 ucbste shors on (yee
| Gmprt ,£ wes ax ot dhe dime 4 gore PHracdiee on Hot uebs/t.
| wher Spue visi} dhe uebsik QM, gtr byowsen sends dhe
| Toleornation Jack do dhe s/t.
* The main aim + (ORIRS 3S to Fdendiy eesores Livers & perhaps
Pricpane avthorigd web pags x Shen:
web framing attacks such as Aijackicg use efarmes do jack a
; visors a: setsioo. The mast larmon ale} ite elle Rome shes,
i ; \« » eT Yael
pacverts asik fon fonchdo icf wher Jaded aside a Kame.
a
+ dime Intowal at
eae buastirg alles fe mone packet por F i ee
. them — serzs-
she cost af wat Pr o
decievin
do which beggars hake
| @ ste delavt posewerd, months
tx opps Rk extinsions Sastell atin ,