12.07.2015 Views

by Police - Bureau of Police Research and Development

by Police - Bureau of Police Research and Development

by Police - Bureau of Police Research and Development

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

The Indian <strong>Police</strong> Journalnumbers looking for modem carrier having detected modem,it allows to compromise the system that answers to the call. ‣ Wireless Reconnaissance: Information-gathering using thenetwork information using the wireless network. Tracingany wireless network <strong>by</strong> scanning is called war diving.• Social EngineeringA method <strong>of</strong> gathering information through non-technical meansinstead <strong>of</strong> exploiting through the vulnerabilities or exploits.• Gaining accessThe next stage is to gain access. Attackers gain access <strong>by</strong> enteringinto the remote system through vulnerabilities <strong>and</strong> exploit themthrough least privilege, subsequently, raising their privilege toadministrator level <strong>and</strong> compromise the systems using somepassword cracking tools. Once the vulnerabilities <strong>of</strong> system <strong>and</strong>network are compromised, attacker has full control over thesystem/network <strong>and</strong> the privilege escalation would contribute toperform malicious activity.• Maintaining accessNext stage that follows the gaining access stage is the maintainingaccess. The attackers operate to either upload or download thecritical information. As long as the information hunted for is notobtained, attackers maintain their access on the compromisedsystem/network. In order to enable this, sophisticated tools arebeing misused <strong>by</strong> the hackers. In a physical data theft, the objectthat has been stolen would not be available, whereas in electronicMedia, the object/data that is lost will be available <strong>and</strong> stolen too.By the time the victim realizes the incident, it would be a longway.Evasion TechniquesEvasion is the process <strong>of</strong> criminality, wherein the <strong>of</strong>fender tries toavoid detection. Distributed Network, technical complexity, scattered Technically savvy <strong>of</strong>fender can clear the entry into the victims systemor the network, leaving little or no traces.Assessment <strong>and</strong> ResponseCrime. Consideration for wider range <strong>of</strong> exploits, volatile nature <strong>of</strong>100 January - March, 2013

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!