Sunday, December 02, 2018

Privacy Attacks

Here attacker uses various  automated   tools which are freely available  on the internet. Some of them  are as follows:

1) Trojan-:Trojan  is a Remote  Administration  Tool (R.<\T) which enable  attacker  to execute  various  software and hardware instructions on the target  system.

Most  troj ans consist  of two parts  -
  1. a) The Server Part:- It has to be installed  on the the victim's  
  2. b) The Client Part r- It is installed on attacker's sy  This part  gives attacker complete  control  over target  computer.


Netbus,  Girlfriend, subz,  Beast, Back Orifice are some of the popular trojans.

2) Ke.ylogger :- Keyloggers are the tools which enable  attacker  to record  all the keystrokes  made  by victim and send it's logs secretly  to the attacker's e-mail  address which is previously set by him.

Almost  all the Trojans  have keylogging function.

3) Spyware  :- Spyware utilities are the malicious programs that spy on the activities of victim, and covertlypass on the re.corded information to the attacker without the victim's consent. Most spyware utilities monitor and record the victim's interne.t• surfing habits. Typically, a spyware tool is built into a host .exe file or utility. If a victim downloads and executes an infected .exe file, then the spywarebecomes active on the victim's system.
Spyware tools can be hidden both in .exe files an even ordinary cookie files.
Most spyware tools are created and re.leased on the internet with the aim of collecting useful information about a large number of Internet users for marketing and advertising purposes. On many occasions, attacker also usespyware tools for corporate espionage and spying purposes.

4) Sniffer :- Sniffers were originally developed as a tool for debugging/troubleshooting networkproblems.
The Ethernet based sniffer works with network interface card (NIC) to capture
interprete and save the data packets sent across the network.
Sniffer can turn out to be quite dangerous. If an attacker manages to install a sniffer on your system or the router of your network, then all data including passwords, private messages, company secrets, etc. get captured.

No comments:

Post a Comment