12.07.2015 Views

by Police - Bureau of Police Research and Development

by Police - Bureau of Police Research and Development

by Police - Bureau of Police Research and Development

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

The Indian <strong>Police</strong> Journalcrimeware/malware to execute deception techniques. Attack cycle isrepresented below:• ReconnaissanceFigure 5: Exploitation TacticsSeveral forms <strong>of</strong> information-gathering is done effectively throughaddress, Phone number system, Internet-based as well as physicalreconnaissance-based on the sources from which information isgathered.Internet-based reconnaissance wherein the attacker performs astealth scan in order to identify the systems on the Net, servicesrunning on the remote machine, operating systems that arerunning on the remote system, including the vulnerabilities inthem. ‣ Telephone reconnaissance: In this type, the attacker exploits war dialling: a method uses a system to dial several phoneJanuary - March, 201399

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!