SlideShare a Scribd company logo
1 of 69
Computer and Network Security
University Of Sulaimani
Faculty of Physical and Basic Education
By: MSc. Karwan M. Kareem
Symantec's analysis of security threats in 2014 revealed thieves are working faster
than companies can defend themselves, and launching more malicious attacks than
in previous years.
More than 317 million new pieces of malware -- computer viruses or other malicious
software -- were created last year. That means nearly one million new threats were
released each day. April 14, 2015 - cnn.com
 The Metro online newspaper claims that cumbersome costs Britain almost
£1,000 every second, this newspaper show that cyber-attacks is costing the
British economy £27billion a year. These losses just occurred in the UK. We can
ask how many costs or losses occur every day around the world via cyber-
attack. 17 Feb 2011 - metro.co.uk
 The computerweekly online newspaper claims Cyber security incidents cost
UK firms £34.1bn in the past year, but under half have enhanced defences, a
survey has revealed.
14 Jul 2016 12:45 - computerweekly.com
 Haveibeenpwned official website write that 1,801,838,008 web accounts have
been hacked haveibeenpwned.com – 10/2016
 The official acunetix website write that 70% of websites and networks are
hackable! Close your doors shut before hackers find you
ttps://www.acunetix.com - 2016
Deep web and Dark web :
The deep web, invisible web, or hidden web are parts of the World Wide Web
whose contents are not indexed by standard search engines for any reason.
Deep web
Dark web
Watch Cyber Attacks in Real Time
unique attack intelligence that helps our customers block attacks..
Hamza Bendelladj:
 The 27-year-old Algerian computer science graduate.
 He create a banking trojan horse called SpyEye.
 using a computer virus to steal money from more than 200 American
banks.
 According to Wired, a San Francisco-based technology magazine
“This infected more than 1.4 million computers in the US”.
 He then reportedly gave millions of dollars to Palestinian charities.
21 SEPTEMBER 2015
Haveibeenpwned official website write that
1,801,838,008 web accounts have been hacked
Use a Host-Based Firewall :
 Download files only from trusted sites..
 Not to open any unknown source downloads.
 For example: Brother soft
 Over 800 000 APK files , Over 200 000 free computer software ..
DDOS Agent – Handler Attack Model technique
IRC – based DDOS attack technique
ComputerWorld website that CryptoPhone users found and mapped
17 fake “cell towers” in the U.S. during the month of July.
computerworld.com - Sep 2, 2014
IMSI catcher:
IMSI catcher:
2G (optional 3G) voice & data
interception and location system
IMSI-Catchers are false mobile towers (base stations) acting between the target
mobile phone(s) and the real towers of service providers. As such they are
considered a Man-In-The-Middle (MITM) attack. In the USA the IMSI-Catcher
technology is known under the name “StingRay“.
IMSI catcher:
The FBI or local police regularly deploys IMSI-Catchers hidden in vehicles at
protests to obtain a record of everyone who attended with a cell phone (leave
your phones at home by all means if you really have to attend).
IMSI-Catchers also allow adversaries to intercept your conversations, text
messages, and data. Police can use them to determine your location, or to find
out who is in a given geographic area at what time.
IMSI catcher:
The Passive GSM Interceptor is a real time dual or quad band 2G (optional 3G) voice &
data interception and location system which utilises NO transmitting parts and is
undetectable to both the hand set user and network operator.
– Interception of Incoming and Outgoing encrypted GSM communications including A5/1
in real-time and without the cooperation of network operators.
– Interception of multiple simultaneous duplex calls (from 4 to 200 Channels available).
– Extraction of phone identities including IMSI, IMEI and MSISDN.
– Manipulation of target phone (SMS, Calls etc) using optional. “Active Add-On”.
– Real time target location (2-4m accuracy using A-GPS).
– Detailed country mapping provided.
IMSI catcher: Passive GSM Interceptor
Advanced passive GSM Interception System is designed for off - air interception
for cellular communication in GSM networks.
The system listens to information exchange Between BTS (Base Transceiver
Station) and MS (MoBile Station or, in another words, mobile phone), and, after
a real time signal processing, intercepted calls can Be listened and recorded.
IMSI catcher: Advanced GSM Interceptor
The GSMK CryptoPhone 500 is an Android-based secure mobile phone with 360°
mobile device security for secure messaging and voice over IP communication on
any network.
GSMK CryptoPhones are your trustworthy solution for completely confidential
encrypted telephone calls – whether by GSM cellular network, 3G/UMTS, satellite,
or land line
http://www.cryptophone.de/en/products/mobile/cp500/
GSMK CryptoPhone 500:
Price  3500$
AIMSICD is an app to detect IMSI-Catchers. AIMSICD attempts to detect IMSI-
Catchers through various methods such as these:
- Check tower information consistency
- Signal strength monitoring
- Detect FemtoCells LAC/Cell ID Consistency
- Check Neighboring Cell Info
- Look for silent SMS
- Prevent silent app installations
AIMSICD:
http://cellularprivacy.github.io/Android-IMSI-Catcher-Detector/
Spy and Attack Emergency Management – police :
Price  3500$
Droidjack:
 DroidJack gives you the power to establish control Android devices with
an easy to use GUI and all the features you need to monitor and spy
them.
http://droidjack.net/
able to spy and monitor on an Android ..
 Build a custom APK or bind the
payload to an already existing APK
such as a game or social media
app
 you'll be able to check the phone's incoming and
outgoing SMS messages..
spy2mobile
Spy2mobile:
 you'll be able to check the
phone's call history..
 you'll be able to
check the contact
list..
 you'll be able to check the current location like accuracy,
speed, altitude and previous tracks..
 SpyHuman is an efficient tool that allows you to monitor your
kid’s or your employee’s online/offline activities like GPS
Locations, SMS chatting. Social sites activities, Call logs etc.
SpyHuman :
https://spyhuman.com/
Attacker can use Wireshark to analyze network packets, password sniffing, cookie
stealing, session hijacking and information stealing.
Wireshark
Wifislax is a Slackware-based Linux distribution designed for wireless hacking and forensics.
It contains a large number of security and forensics tools, which transforms it into a
pentesting (penetration testing).
Acunetix Vulnerability Scanner automatically crawls and scans custom-built websites
and web applications for SQL Injection, XSS, XXE, SSRF, Host Header Attacks & over 500
other web vulnerabilities..
https://www.acunetix.com/
site24x7 : Find IP Address of your website. Sign up for a Site24x7 Free Account
to monitor up to 5 websites for free continuously and be alerted when it goes
down!
https://www.site24x7.com/find-ip-address-of-web-site.html
Metadefender :
Scan an IP address using 12 sources to determine if it has been compromised.
https://www.metadefender.com/#!/submit-ip
Whatismyipaddress:
This IP-address search will give you general details only about what is on the end
of that IP address. Here's what you'll find out:
The ISP and organization's name
The IP's host name
The country it's in
The region/state
The city (a best guess) , with further information …
http://whatismyipaddress.com/ip-lookup
Tor :
a form of network surveillance that threatens personal freedom
and privacy, confidential business activities and relationships, and
state security.
https://www.torproject.org
Onion Link and Not Evil :
To search in deep web, Enabling search and global access to Tor's onionsites
https://hss3uro2hsxfogfq.onion.to/
http://www.onion.link/
Haveibeenpwned :
Check if you have an account that has been compromised in a data breach
https://haveibeenpwned.com/
RedPhone :
Makes private communication simple. Free, world-wide, end-to-end encryption
for your calls, securing your conversations so that nobody can listen in.
https://play.google.com/store/apps/details?id=com.littlebytesofpi.linphonesip&
Baidu Antivirus 2015:
 Baidu Antivirus is 100% free, forever.
 New virus definitions are always free.
http://antivirus.baidu.com/en/
Linux os:
 Linux is more secure than other operating systems.
Original Windows OS
 - Windows with license key ..
Backup file :
 Be sure do a full back up of your system on a regular basis. A backup file is a
copy of a file which is kept in case anything happens to the
 Google drive , Dropbox, One drive …
Use a Host-Based Firewall :
 A personal firewall is an application which controls network traffic to and
from a computer ..
Wise Folder Hider is a free file/folder hiding tool. Users can use it to hide files and
folders on local partitions or removable devices.
Hide data Wise Folder Hider:
Hide data with steganography:
You can use a steganography program to hide data inside other data.
OpenStego is just 203 KB in size and is easy to use steganography application. You
can attach any type of secret message file to cover files. Supported file types for
cover are: BMP, GIF, JPEG, JPG, PNG, and WBMP
http://www.openstego.com/
Wise Care 365: PC Cleaning and Speed up Tool
Clean registry and junk files from your PCs. Protect your privacy and make your
PCs more secure. Provide a better option of optimizing and accelerating your
computer! Over 30,000,000 downloads worldwide
http://www.openstego.com/
http://www.wisecleaner.com/
VirusTotal :
VirusTotal is a free service that analyzes suspicious files and URLs and facilitates
the quick detection of viruses, worms, trojans, and all kinds of malware.
https://www.virustotal.com/
Computer Virus
• Definition
- Computer program “Piece of code” that automatically
reproduces itself.
- It’s attached to other programs or files, but requires user
intervention to propagate.
• Background
- There are estimated 30,000 computer viruses in existence
-Over 300 new ones are created each month
-Today almost 87% of all viruses are spread through the internet
• Infection (targets/carriers)
- Executable files
- Boot sectors
- Documents (macros), scripts (web pages), etc.
• Propagation
is made by the user. The mechanisms are storage elements,
mails, downloaded files or shared folders
Halabjay Virus: is an Kurdish malware which is developed by kurd-
intruder to test and analyze computer virus behaviors..
Worm
• Definition
-Piece of code that automatically reproduces itself over the
network. It doesn’t need the user intervention to propagate
(autonomous).
• Target selection algorithm
-Email addresses, DNS, IP, network neighborhood
• Payload
- Malicious programs
-Backdoor, DDoS agent, etc.
• Anatomy of Worms
- Attack Mechanism
- Payload
- New target selection
 Trojans
• A Trojan horse or Trojan, is a destructive program that masquerades
as an application.
- The Trojan Horse, at first glance will appear to be useful
software but will actually do damage once installed or run on
your computer.
-Unlike viruses and worms, Trojans do not reproduce by
infecting other files nor do they self-replicate.
•What Trojans can do?
Use of the machine as part of a Botnet (e.g. to perform
automated spamming or to distribute Denial-of-service.)
Uninstallation of software, including third-party router drivers.
Downloading or uploading of files on the network hdd.
Watching the user’s screen.
Spreading other malware? Such as viruses. In this case? The
Trojan horse is called a dropper or vector.
Modification or deletion of files.
Data theft(e.g. retrieving username or postal code information)
Crashing the computer.
Setting up networks of zombie computers in order to launch
Dodos attacks or send spam.
Social Engineering
• Definition
- Manipulating a person or persons to detect and steal
confidential data and information.
- It is a way for criminals to gain access to information systems.
The purpose of social engineering is usually to secretly install
spyware, other malicious software or to trick persons into
handing over passwords and/or other sensitive financial or
personal information.
• What are they looking for ?
- Obtaining simple information such as your pet's name, where
you're from, the places you've visited; information that you'd give
out freely to your friends.
- Some have a 'secret question' you have to answer, if you cannot
remember your username or password. The questions seem
pretty tough for an outsider looking into trying to hack into your
account.
 What's the name of your first pet?
 What is your maiden name?
 When was your mother/father born?
 Where were you born?
Computer security
Login Alerts:
Get an alert when anyone logs into your account from an unrecognized
device or browser.
Login Approvals:
Require a login code to access my account from unknown browsers
Public key:
Use this public key to encrypt notification emails that Facebook sends
you?
Your trusted contacts:
Your trusted contacts are friends you chose who can securely help if you
ever have trouble accessing your account.
Recognized devices:
You won't get notified or have to confirm your identity when logging in
from these devices:
where are you logged in:
Review and manage where are you logged into Facebook
Legacy contact :
Chose a family member or close friend to care for your account if
something's happens to you ..
Who can look me up :
1/ Who can look you up using the email address you provided ?
2/ Who can look you up using the phone number you provided ?
3/ Do you want search engines outside of Facebook to link to your
profile?
Restricted List and Block User:
When you add a friend to your Restricted List:
1/ they won't see posts on Facebook that you share only to Friends.
2/ They may still see things you share to Public.
3/ Facebook doesn't notify your friends when you add them to your
Restricted List.
Restricted List and Block User:
When you add a friend to your Restricted List:
1/ they won't see posts on Facebook that you share only to Friends.
2/ They may still see things you share to Public.
3/ Facebook doesn't notify your friends when you add them to your
Restricted List.
Block message :
If you block messages and video calls from someone here:
1/ they won't be able to contact you in the Messenger app.
2/ they may be able to post on your Timeline, tag you, and comment on
your posts or comments
Download a copy of your Facebook data:
Get a copy of what you have done on Facebook …
Facebook Disabled - Ineligible
“ I hope to retrieve my account and confirmed and are usually activated
because it is very important. Thank Company Facebook "
https://www.facebook.com/help/contact/317389574998690
How to active a disable Facebook..?
4K Stogram:
 4K Stogram is an Instagram Downloader for PC, Mac and Linux. The
program allows you to download and backup Instagram photos and
videos, even from private accounts
https://www.4kdownload.com/products/product-stogram
Google hacking :
 Google hacking, also named Google dorking, is a computer hacking
technique that uses Google Search and other Google applications to
find security holes in the configuration and computer code that
websites use.
 Google Hacking Database (GHDB) link:
https://www.exploit-db.com/google-hacking-database/
Admin Page Finder:
 This is excellent admin page finder,
 it have the biggest dork list wich use to find admin page.
 It is bigger then havij, other programs, online scanners or perl scripts.
https://www.youtube.com/watch?v=RLSoMS8AoRg
END…

More Related Content

What's hot

Chapter 8 Wireless Network Security
Chapter 8 Wireless Network SecurityChapter 8 Wireless Network Security
Chapter 8 Wireless Network SecurityDr. Ahmed Al Zaidy
 
Computer & internet Security
Computer & internet SecurityComputer & internet Security
Computer & internet SecurityGerard Lamusse
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device SecurityNemwos
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpointgalaxy201
 
Advanced cryptography and implementation
Advanced cryptography and implementationAdvanced cryptography and implementation
Advanced cryptography and implementationAkash Jadhav
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?Lookout
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewallCoder Tech
 
Session Hijacking ppt
Session Hijacking pptSession Hijacking ppt
Session Hijacking pptHarsh Kevadia
 
cellphone virus and security
cellphone virus and securitycellphone virus and security
cellphone virus and securityAkhil Kumar
 
Cyber crime and cyber laws
Cyber crime and cyber lawsCyber crime and cyber laws
Cyber crime and cyber lawsishmecse13
 
Common malware and countermeasures
Common malware and countermeasuresCommon malware and countermeasures
Common malware and countermeasuresNoushin Ahson
 
Email security
Email securityEmail security
Email securitySultanErbo
 

What's hot (20)

Chapter 8 Wireless Network Security
Chapter 8 Wireless Network SecurityChapter 8 Wireless Network Security
Chapter 8 Wireless Network Security
 
System security
System securitySystem security
System security
 
Mobile security
Mobile securityMobile security
Mobile security
 
Mian
MianMian
Mian
 
Computer & internet Security
Computer & internet SecurityComputer & internet Security
Computer & internet Security
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
Mobile Forensics
Mobile Forensics Mobile Forensics
Mobile Forensics
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
 
Advanced cryptography and implementation
Advanced cryptography and implementationAdvanced cryptography and implementation
Advanced cryptography and implementation
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewall
 
WhatsApp Forensic
WhatsApp ForensicWhatsApp Forensic
WhatsApp Forensic
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to security
 
Session Hijacking ppt
Session Hijacking pptSession Hijacking ppt
Session Hijacking ppt
 
Network Security
Network SecurityNetwork Security
Network Security
 
cellphone virus and security
cellphone virus and securitycellphone virus and security
cellphone virus and security
 
Cyber crime and cyber laws
Cyber crime and cyber lawsCyber crime and cyber laws
Cyber crime and cyber laws
 
Common malware and countermeasures
Common malware and countermeasuresCommon malware and countermeasures
Common malware and countermeasures
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
 
Email security
Email securityEmail security
Email security
 

Viewers also liked

Integrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor NetworksIntegrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor NetworksEditor IJMTER
 
Computer and Network Security
Computer and Network SecurityComputer and Network Security
Computer and Network Securityprimeteacher32
 
ITSolutions|Currie Network Security Seminar
ITSolutions|Currie Network Security SeminarITSolutions|Currie Network Security Seminar
ITSolutions|Currie Network Security SeminarDaniel Versola
 
Network security engineer performance appraisal
Network security engineer performance appraisalNetwork security engineer performance appraisal
Network security engineer performance appraisaldeant0017
 
Ethical Hacking & Network Security
Ethical Hacking & Network Security Ethical Hacking & Network Security
Ethical Hacking & Network Security Lokender Yadav
 
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGESA SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGESEditor IJCTER
 
network security, cryptography,steganography
network security, cryptography,steganographynetwork security, cryptography,steganography
network security, cryptography,steganographyNikhil l
 
Reconnaissance - For pentesting and user awareness
Reconnaissance - For pentesting and user awarenessReconnaissance - For pentesting and user awareness
Reconnaissance - For pentesting and user awarenessLeon Teale
 
Shodan- That Device Search Engine
Shodan- That Device Search EngineShodan- That Device Search Engine
Shodan- That Device Search EngineInMobi Technology
 
Wireless sensor network report
Wireless sensor network reportWireless sensor network report
Wireless sensor network reportGanesh Khadsan
 
Reconnaissance & Scanning
Reconnaissance & ScanningReconnaissance & Scanning
Reconnaissance & Scanningamiable_indian
 
Wireless network ppt
Wireless network pptWireless network ppt
Wireless network pptBasil John
 

Viewers also liked (20)

Computer Network Security
Computer Network SecurityComputer Network Security
Computer Network Security
 
Report on Hacking
Report on HackingReport on Hacking
Report on Hacking
 
Integrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor NetworksIntegrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor Networks
 
Computer and Network Security
Computer and Network SecurityComputer and Network Security
Computer and Network Security
 
ITSolutions|Currie Network Security Seminar
ITSolutions|Currie Network Security SeminarITSolutions|Currie Network Security Seminar
ITSolutions|Currie Network Security Seminar
 
Paste Digest Project
Paste Digest ProjectPaste Digest Project
Paste Digest Project
 
Cryptography
Cryptography Cryptography
Cryptography
 
Prevention of Denial-of-Service Attack In Wireless Sensor Network via NS-2
Prevention of Denial-of-Service Attack In Wireless Sensor Network via NS-2Prevention of Denial-of-Service Attack In Wireless Sensor Network via NS-2
Prevention of Denial-of-Service Attack In Wireless Sensor Network via NS-2
 
Network security engineer performance appraisal
Network security engineer performance appraisalNetwork security engineer performance appraisal
Network security engineer performance appraisal
 
Computer and Network Security
Computer and Network SecurityComputer and Network Security
Computer and Network Security
 
Ethical Hacking & Network Security
Ethical Hacking & Network Security Ethical Hacking & Network Security
Ethical Hacking & Network Security
 
Security issues
Security issuesSecurity issues
Security issues
 
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGESA SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
 
network security, cryptography,steganography
network security, cryptography,steganographynetwork security, cryptography,steganography
network security, cryptography,steganography
 
Reconnaissance - For pentesting and user awareness
Reconnaissance - For pentesting and user awarenessReconnaissance - For pentesting and user awareness
Reconnaissance - For pentesting and user awareness
 
Shodan- That Device Search Engine
Shodan- That Device Search EngineShodan- That Device Search Engine
Shodan- That Device Search Engine
 
Ch13 security engineering
Ch13 security engineeringCh13 security engineering
Ch13 security engineering
 
Wireless sensor network report
Wireless sensor network reportWireless sensor network report
Wireless sensor network report
 
Reconnaissance & Scanning
Reconnaissance & ScanningReconnaissance & Scanning
Reconnaissance & Scanning
 
Wireless network ppt
Wireless network pptWireless network ppt
Wireless network ppt
 

Similar to Computer and Network Security Tips

Making your Asterisk System Secure
Making your Asterisk System SecureMaking your Asterisk System Secure
Making your Asterisk System SecureDigium
 
Mobile security 8soft_final_summercamp2011
Mobile security 8soft_final_summercamp2011Mobile security 8soft_final_summercamp2011
Mobile security 8soft_final_summercamp2011Zarafa
 
IQT 2010 - The App Does That!?
IQT 2010 - The App Does That!?IQT 2010 - The App Does That!?
IQT 2010 - The App Does That!?Tyler Shields
 
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...Qazi Anwar
 
DISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptx
DISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptxDISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptx
DISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptxmahendrarm2112
 
OmniSpotlight 05-2014
OmniSpotlight 05-2014OmniSpotlight 05-2014
OmniSpotlight 05-2014Anita Lösch
 
The Consumerisation of Corporate IT
The Consumerisation of Corporate ITThe Consumerisation of Corporate IT
The Consumerisation of Corporate ITPeter Wood
 
Protect your IPPBX against VOIP attacks
Protect your IPPBX against VOIP attacksProtect your IPPBX against VOIP attacks
Protect your IPPBX against VOIP attacksRohan Fernandes
 
beware of Thing Bot
beware of Thing Botbeware of Thing Bot
beware of Thing BotBellaj Badr
 
Using Network Security and Identity Management to Empower CISOs Today: The Ca...
Using Network Security and Identity Management to Empower CISOs Today: The Ca...Using Network Security and Identity Management to Empower CISOs Today: The Ca...
Using Network Security and Identity Management to Empower CISOs Today: The Ca...ForgeRock
 
When developers api simplify user mode rootkits development – part ii
When developers api simplify user mode rootkits development – part iiWhen developers api simplify user mode rootkits development – part ii
When developers api simplify user mode rootkits development – part iiSTO STRATEGY
 
A Review Paper on Cyber-Security
A Review Paper on Cyber-SecurityA Review Paper on Cyber-Security
A Review Paper on Cyber-SecurityIRJET Journal
 
Anatomy of an Advanced Retail Breach
Anatomy of an Advanced Retail BreachAnatomy of an Advanced Retail Breach
Anatomy of an Advanced Retail BreachIBM Security
 
You think you are safe online. Are You?
You think you are safe online. Are You?You think you are safe online. Are You?
You think you are safe online. Are You?TechGenie
 

Similar to Computer and Network Security Tips (20)

Making your Asterisk System Secure
Making your Asterisk System SecureMaking your Asterisk System Secure
Making your Asterisk System Secure
 
Mobile security 8soft_final_summercamp2011
Mobile security 8soft_final_summercamp2011Mobile security 8soft_final_summercamp2011
Mobile security 8soft_final_summercamp2011
 
Hacking and its Defence
Hacking and its DefenceHacking and its Defence
Hacking and its Defence
 
IQT 2010 - The App Does That!?
IQT 2010 - The App Does That!?IQT 2010 - The App Does That!?
IQT 2010 - The App Does That!?
 
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
 
DISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptx
DISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptxDISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptx
DISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptx
 
OmniSpotlight 05-2014
OmniSpotlight 05-2014OmniSpotlight 05-2014
OmniSpotlight 05-2014
 
Hacking by Pratyush Gupta
Hacking by Pratyush GuptaHacking by Pratyush Gupta
Hacking by Pratyush Gupta
 
Network monitoring white paper
Network monitoring white paperNetwork monitoring white paper
Network monitoring white paper
 
The Consumerisation of Corporate IT
The Consumerisation of Corporate ITThe Consumerisation of Corporate IT
The Consumerisation of Corporate IT
 
Protect your IPPBX against VOIP attacks
Protect your IPPBX against VOIP attacksProtect your IPPBX against VOIP attacks
Protect your IPPBX against VOIP attacks
 
Null pune 1st March-news bytes
Null pune 1st March-news bytesNull pune 1st March-news bytes
Null pune 1st March-news bytes
 
beware of Thing Bot
beware of Thing Botbeware of Thing Bot
beware of Thing Bot
 
Using Network Security and Identity Management to Empower CISOs Today: The Ca...
Using Network Security and Identity Management to Empower CISOs Today: The Ca...Using Network Security and Identity Management to Empower CISOs Today: The Ca...
Using Network Security and Identity Management to Empower CISOs Today: The Ca...
 
When developers api simplify user mode rootkits development – part ii
When developers api simplify user mode rootkits development – part iiWhen developers api simplify user mode rootkits development – part ii
When developers api simplify user mode rootkits development – part ii
 
Hamza
HamzaHamza
Hamza
 
A Review Paper on Cyber-Security
A Review Paper on Cyber-SecurityA Review Paper on Cyber-Security
A Review Paper on Cyber-Security
 
Anatomy of an Advanced Retail Breach
Anatomy of an Advanced Retail BreachAnatomy of an Advanced Retail Breach
Anatomy of an Advanced Retail Breach
 
You think you are safe online. Are You?
You think you are safe online. Are You?You think you are safe online. Are You?
You think you are safe online. Are You?
 
Security News bytes October 2013
Security News bytes  October 2013Security News bytes  October 2013
Security News bytes October 2013
 

More from Karwan Mustafa Kareem

More from Karwan Mustafa Kareem (7)

Java programming: Elementary practice
Java programming: Elementary practiceJava programming: Elementary practice
Java programming: Elementary practice
 
Java Programming: Loops
Java Programming: LoopsJava Programming: Loops
Java Programming: Loops
 
Java Programmin: Selections
Java Programmin: SelectionsJava Programmin: Selections
Java Programmin: Selections
 
Java programming: Elementary programming
Java programming: Elementary programmingJava programming: Elementary programming
Java programming: Elementary programming
 
Introduction to Java Programming Language
Introduction to Java Programming Language Introduction to Java Programming Language
Introduction to Java Programming Language
 
MySQL Database with phpMyAdmin
MySQL Database with  phpMyAdminMySQL Database with  phpMyAdmin
MySQL Database with phpMyAdmin
 
Database Application with MySQL
Database Application with MySQL   Database Application with MySQL
Database Application with MySQL
 

Recently uploaded

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Recently uploaded (20)

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Computer and Network Security Tips

  • 1. Computer and Network Security University Of Sulaimani Faculty of Physical and Basic Education By: MSc. Karwan M. Kareem
  • 2. Symantec's analysis of security threats in 2014 revealed thieves are working faster than companies can defend themselves, and launching more malicious attacks than in previous years. More than 317 million new pieces of malware -- computer viruses or other malicious software -- were created last year. That means nearly one million new threats were released each day. April 14, 2015 - cnn.com
  • 3.  The Metro online newspaper claims that cumbersome costs Britain almost £1,000 every second, this newspaper show that cyber-attacks is costing the British economy £27billion a year. These losses just occurred in the UK. We can ask how many costs or losses occur every day around the world via cyber- attack. 17 Feb 2011 - metro.co.uk
  • 4.  The computerweekly online newspaper claims Cyber security incidents cost UK firms £34.1bn in the past year, but under half have enhanced defences, a survey has revealed. 14 Jul 2016 12:45 - computerweekly.com
  • 5.  Haveibeenpwned official website write that 1,801,838,008 web accounts have been hacked haveibeenpwned.com – 10/2016
  • 6.  The official acunetix website write that 70% of websites and networks are hackable! Close your doors shut before hackers find you ttps://www.acunetix.com - 2016
  • 7.
  • 8. Deep web and Dark web : The deep web, invisible web, or hidden web are parts of the World Wide Web whose contents are not indexed by standard search engines for any reason. Deep web Dark web
  • 9. Watch Cyber Attacks in Real Time unique attack intelligence that helps our customers block attacks..
  • 10. Hamza Bendelladj:  The 27-year-old Algerian computer science graduate.  He create a banking trojan horse called SpyEye.  using a computer virus to steal money from more than 200 American banks.  According to Wired, a San Francisco-based technology magazine “This infected more than 1.4 million computers in the US”.  He then reportedly gave millions of dollars to Palestinian charities. 21 SEPTEMBER 2015
  • 11. Haveibeenpwned official website write that 1,801,838,008 web accounts have been hacked
  • 12. Use a Host-Based Firewall :  Download files only from trusted sites..  Not to open any unknown source downloads.  For example: Brother soft  Over 800 000 APK files , Over 200 000 free computer software ..
  • 13. DDOS Agent – Handler Attack Model technique
  • 14. IRC – based DDOS attack technique
  • 15. ComputerWorld website that CryptoPhone users found and mapped 17 fake “cell towers” in the U.S. during the month of July. computerworld.com - Sep 2, 2014 IMSI catcher:
  • 16. IMSI catcher: 2G (optional 3G) voice & data interception and location system
  • 17. IMSI-Catchers are false mobile towers (base stations) acting between the target mobile phone(s) and the real towers of service providers. As such they are considered a Man-In-The-Middle (MITM) attack. In the USA the IMSI-Catcher technology is known under the name “StingRay“. IMSI catcher:
  • 18. The FBI or local police regularly deploys IMSI-Catchers hidden in vehicles at protests to obtain a record of everyone who attended with a cell phone (leave your phones at home by all means if you really have to attend). IMSI-Catchers also allow adversaries to intercept your conversations, text messages, and data. Police can use them to determine your location, or to find out who is in a given geographic area at what time. IMSI catcher:
  • 19. The Passive GSM Interceptor is a real time dual or quad band 2G (optional 3G) voice & data interception and location system which utilises NO transmitting parts and is undetectable to both the hand set user and network operator. – Interception of Incoming and Outgoing encrypted GSM communications including A5/1 in real-time and without the cooperation of network operators. – Interception of multiple simultaneous duplex calls (from 4 to 200 Channels available). – Extraction of phone identities including IMSI, IMEI and MSISDN. – Manipulation of target phone (SMS, Calls etc) using optional. “Active Add-On”. – Real time target location (2-4m accuracy using A-GPS). – Detailed country mapping provided. IMSI catcher: Passive GSM Interceptor
  • 20. Advanced passive GSM Interception System is designed for off - air interception for cellular communication in GSM networks. The system listens to information exchange Between BTS (Base Transceiver Station) and MS (MoBile Station or, in another words, mobile phone), and, after a real time signal processing, intercepted calls can Be listened and recorded. IMSI catcher: Advanced GSM Interceptor
  • 21. The GSMK CryptoPhone 500 is an Android-based secure mobile phone with 360° mobile device security for secure messaging and voice over IP communication on any network. GSMK CryptoPhones are your trustworthy solution for completely confidential encrypted telephone calls – whether by GSM cellular network, 3G/UMTS, satellite, or land line http://www.cryptophone.de/en/products/mobile/cp500/ GSMK CryptoPhone 500: Price  3500$
  • 22. AIMSICD is an app to detect IMSI-Catchers. AIMSICD attempts to detect IMSI- Catchers through various methods such as these: - Check tower information consistency - Signal strength monitoring - Detect FemtoCells LAC/Cell ID Consistency - Check Neighboring Cell Info - Look for silent SMS - Prevent silent app installations AIMSICD: http://cellularprivacy.github.io/Android-IMSI-Catcher-Detector/
  • 23. Spy and Attack Emergency Management – police : Price  3500$
  • 24. Droidjack:  DroidJack gives you the power to establish control Android devices with an easy to use GUI and all the features you need to monitor and spy them. http://droidjack.net/ able to spy and monitor on an Android ..  Build a custom APK or bind the payload to an already existing APK such as a game or social media app
  • 25.  you'll be able to check the phone's incoming and outgoing SMS messages.. spy2mobile Spy2mobile:
  • 26.  you'll be able to check the phone's call history..  you'll be able to check the contact list..
  • 27.  you'll be able to check the current location like accuracy, speed, altitude and previous tracks..
  • 28.  SpyHuman is an efficient tool that allows you to monitor your kid’s or your employee’s online/offline activities like GPS Locations, SMS chatting. Social sites activities, Call logs etc. SpyHuman : https://spyhuman.com/
  • 29. Attacker can use Wireshark to analyze network packets, password sniffing, cookie stealing, session hijacking and information stealing. Wireshark
  • 30. Wifislax is a Slackware-based Linux distribution designed for wireless hacking and forensics. It contains a large number of security and forensics tools, which transforms it into a pentesting (penetration testing).
  • 31. Acunetix Vulnerability Scanner automatically crawls and scans custom-built websites and web applications for SQL Injection, XSS, XXE, SSRF, Host Header Attacks & over 500 other web vulnerabilities.. https://www.acunetix.com/
  • 32. site24x7 : Find IP Address of your website. Sign up for a Site24x7 Free Account to monitor up to 5 websites for free continuously and be alerted when it goes down! https://www.site24x7.com/find-ip-address-of-web-site.html
  • 33. Metadefender : Scan an IP address using 12 sources to determine if it has been compromised. https://www.metadefender.com/#!/submit-ip
  • 34. Whatismyipaddress: This IP-address search will give you general details only about what is on the end of that IP address. Here's what you'll find out: The ISP and organization's name The IP's host name The country it's in The region/state The city (a best guess) , with further information … http://whatismyipaddress.com/ip-lookup
  • 35. Tor : a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security. https://www.torproject.org
  • 36. Onion Link and Not Evil : To search in deep web, Enabling search and global access to Tor's onionsites https://hss3uro2hsxfogfq.onion.to/ http://www.onion.link/
  • 37. Haveibeenpwned : Check if you have an account that has been compromised in a data breach https://haveibeenpwned.com/
  • 38. RedPhone : Makes private communication simple. Free, world-wide, end-to-end encryption for your calls, securing your conversations so that nobody can listen in. https://play.google.com/store/apps/details?id=com.littlebytesofpi.linphonesip&
  • 39. Baidu Antivirus 2015:  Baidu Antivirus is 100% free, forever.  New virus definitions are always free. http://antivirus.baidu.com/en/
  • 40. Linux os:  Linux is more secure than other operating systems. Original Windows OS  - Windows with license key ..
  • 41. Backup file :  Be sure do a full back up of your system on a regular basis. A backup file is a copy of a file which is kept in case anything happens to the  Google drive , Dropbox, One drive …
  • 42. Use a Host-Based Firewall :  A personal firewall is an application which controls network traffic to and from a computer ..
  • 43. Wise Folder Hider is a free file/folder hiding tool. Users can use it to hide files and folders on local partitions or removable devices. Hide data Wise Folder Hider:
  • 44. Hide data with steganography: You can use a steganography program to hide data inside other data. OpenStego is just 203 KB in size and is easy to use steganography application. You can attach any type of secret message file to cover files. Supported file types for cover are: BMP, GIF, JPEG, JPG, PNG, and WBMP http://www.openstego.com/
  • 45. Wise Care 365: PC Cleaning and Speed up Tool Clean registry and junk files from your PCs. Protect your privacy and make your PCs more secure. Provide a better option of optimizing and accelerating your computer! Over 30,000,000 downloads worldwide http://www.openstego.com/ http://www.wisecleaner.com/
  • 46. VirusTotal : VirusTotal is a free service that analyzes suspicious files and URLs and facilitates the quick detection of viruses, worms, trojans, and all kinds of malware. https://www.virustotal.com/
  • 47. Computer Virus • Definition - Computer program “Piece of code” that automatically reproduces itself. - It’s attached to other programs or files, but requires user intervention to propagate. • Background - There are estimated 30,000 computer viruses in existence -Over 300 new ones are created each month -Today almost 87% of all viruses are spread through the internet • Infection (targets/carriers) - Executable files - Boot sectors - Documents (macros), scripts (web pages), etc. • Propagation is made by the user. The mechanisms are storage elements, mails, downloaded files or shared folders
  • 48. Halabjay Virus: is an Kurdish malware which is developed by kurd- intruder to test and analyze computer virus behaviors..
  • 49. Worm • Definition -Piece of code that automatically reproduces itself over the network. It doesn’t need the user intervention to propagate (autonomous). • Target selection algorithm -Email addresses, DNS, IP, network neighborhood • Payload - Malicious programs -Backdoor, DDoS agent, etc. • Anatomy of Worms - Attack Mechanism - Payload - New target selection
  • 50.  Trojans • A Trojan horse or Trojan, is a destructive program that masquerades as an application. - The Trojan Horse, at first glance will appear to be useful software but will actually do damage once installed or run on your computer. -Unlike viruses and worms, Trojans do not reproduce by infecting other files nor do they self-replicate. •What Trojans can do? Use of the machine as part of a Botnet (e.g. to perform automated spamming or to distribute Denial-of-service.) Uninstallation of software, including third-party router drivers. Downloading or uploading of files on the network hdd. Watching the user’s screen. Spreading other malware? Such as viruses. In this case? The Trojan horse is called a dropper or vector. Modification or deletion of files. Data theft(e.g. retrieving username or postal code information) Crashing the computer. Setting up networks of zombie computers in order to launch Dodos attacks or send spam.
  • 51. Social Engineering • Definition - Manipulating a person or persons to detect and steal confidential data and information. - It is a way for criminals to gain access to information systems. The purpose of social engineering is usually to secretly install spyware, other malicious software or to trick persons into handing over passwords and/or other sensitive financial or personal information. • What are they looking for ? - Obtaining simple information such as your pet's name, where you're from, the places you've visited; information that you'd give out freely to your friends. - Some have a 'secret question' you have to answer, if you cannot remember your username or password. The questions seem pretty tough for an outsider looking into trying to hack into your account.  What's the name of your first pet?  What is your maiden name?  When was your mother/father born?  Where were you born?
  • 53. Login Alerts: Get an alert when anyone logs into your account from an unrecognized device or browser.
  • 54. Login Approvals: Require a login code to access my account from unknown browsers
  • 55. Public key: Use this public key to encrypt notification emails that Facebook sends you?
  • 56. Your trusted contacts: Your trusted contacts are friends you chose who can securely help if you ever have trouble accessing your account.
  • 57. Recognized devices: You won't get notified or have to confirm your identity when logging in from these devices:
  • 58. where are you logged in: Review and manage where are you logged into Facebook
  • 59. Legacy contact : Chose a family member or close friend to care for your account if something's happens to you ..
  • 60. Who can look me up : 1/ Who can look you up using the email address you provided ? 2/ Who can look you up using the phone number you provided ? 3/ Do you want search engines outside of Facebook to link to your profile?
  • 61. Restricted List and Block User: When you add a friend to your Restricted List: 1/ they won't see posts on Facebook that you share only to Friends. 2/ They may still see things you share to Public. 3/ Facebook doesn't notify your friends when you add them to your Restricted List.
  • 62. Restricted List and Block User: When you add a friend to your Restricted List: 1/ they won't see posts on Facebook that you share only to Friends. 2/ They may still see things you share to Public. 3/ Facebook doesn't notify your friends when you add them to your Restricted List.
  • 63. Block message : If you block messages and video calls from someone here: 1/ they won't be able to contact you in the Messenger app. 2/ they may be able to post on your Timeline, tag you, and comment on your posts or comments
  • 64. Download a copy of your Facebook data: Get a copy of what you have done on Facebook …
  • 65. Facebook Disabled - Ineligible “ I hope to retrieve my account and confirmed and are usually activated because it is very important. Thank Company Facebook " https://www.facebook.com/help/contact/317389574998690 How to active a disable Facebook..?
  • 66. 4K Stogram:  4K Stogram is an Instagram Downloader for PC, Mac and Linux. The program allows you to download and backup Instagram photos and videos, even from private accounts https://www.4kdownload.com/products/product-stogram
  • 67. Google hacking :  Google hacking, also named Google dorking, is a computer hacking technique that uses Google Search and other Google applications to find security holes in the configuration and computer code that websites use.  Google Hacking Database (GHDB) link: https://www.exploit-db.com/google-hacking-database/
  • 68. Admin Page Finder:  This is excellent admin page finder,  it have the biggest dork list wich use to find admin page.  It is bigger then havij, other programs, online scanners or perl scripts. https://www.youtube.com/watch?v=RLSoMS8AoRg