Skip to main content
  1. Resources/
  2. Study Materials/
  3. Information & Communication Technology Engineering/
  4. ICT Semester 5/
  5. Cyber Security (4353204)/

6 mins· ·
Milav Dabgar
Author
Milav Dabgar
Experienced lecturer in the electrical and electronic manufacturing industry. Skilled in Embedded Systems, Image Processing, Data Science, MATLAB, Python, STM32. Strong education professional with a Master’s degree in Communication Systems Engineering from L.D. College of Engineering - Ahmedabad.
Types of Attacks

Types of Attacks

Understanding Cyber Threats

Know Your Enemy to Build Better Defenses

Password Cracking Methods

Cyber Attack Overview

Cyber Attack is a malicious attempt to damage, disrupt, or gain unauthorized access to computer systems, networks, or digital devices.

Why Understanding Attacks Matters:

  • Proactive Defense: Know what you're defending against
  • Risk Assessment: Understand threat landscape
  • Security Planning: Design appropriate countermeasures
  • Incident Response: Quickly identify attack types
  • Awareness Training: Educate users about threats

Attack Classification

By Target:

  • Network attacks
  • System attacks
  • Application attacks
  • Data attacks

By Method:

  • Technical attacks
  • Social engineering
  • Physical attacks
  • Insider threats

By Impact:

  • Passive: Monitoring, eavesdropping (CIA: Confidentiality)
  • Active: Modification, disruption (CIA: Integrity, Availability)
  • Destructive: Permanent damage, data loss

Brute Force Attack

Brute Force Attack: Systematic attempt to crack passwords, encryption keys, or access credentials by trying all possible combinations.
Password Brute Force Example:

Target: 4-digit PIN (0000-9999)
Attempts: 0000, 0001, 0002, 0003, ... 9999
Maximum attempts needed: 10,000
Average attempts: 5,000

Time Estimates:
100 attempts/second: Up to 100 seconds
1,000 attempts/second: Up to 10 seconds

Complex Password (8 chars, mixed case, numbers, symbols):
Possible combinations: ~95^8 = 6.6 quintillion
Time at 1 billion attempts/second: ~200 years

Brute Force Attack Variations

  • Dictionary Attack: Uses common passwords and words
  • Hybrid Attack: Dictionary words with number/symbol variations
  • Rainbow Table Attack: Precomputed hash lookups
  • Credential Stuffing: Uses known username/password pairs
  • Password Spraying: Common passwords across many accounts

Countermeasures:

  • Account lockout policies
  • Rate limiting and delays
  • Strong password requirements
  • Multi-factor authentication
  • CAPTCHA implementation

Credential Stuffing Attack

Credential Stuffing: Using stolen username/password pairs from data breaches to gain unauthorized access to other accounts.
Attack Process:

1. Attacker obtains breach data (millions of credentials)
2. Automated tools test credentials across multiple sites
3. Exploits password reuse habits
4. Successfully accesses accounts using same credentials

Real Example:
LinkedIn breach (2012) → Credentials used to attack:
• Banking sites
• E-commerce platforms
• Social media accounts
• Email services
Why It Works: 65% of people reuse passwords across multiple accounts

Social Engineering Attack

Social Engineering: Psychological manipulation of people to divulge confidential information or perform actions that compromise security.

Common Techniques:

  • Pretexting: Creating false scenarios to gain trust
  • Baiting: Offering something enticing to trigger curiosity
  • Scareware: Using fear to prompt immediate action
  • Quid Pro Quo: Offering services in exchange for information
  • Tailgating: Following authorized personnel into secure areas
  • Authority Impersonation: Posing as executives or IT personnel
Success Rate: 98% of cyber attacks rely on social engineering

Phishing Attack

Phishing: Fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity in electronic communications.
Typical Phishing Email:

From: security@yourbank.com (fake address)
Subject: "Urgent: Account Security Alert"

"Your account has been compromised. Click here
immediately to verify your identity and secure
your account: http://fake-bank-site.com

Failure to act within 24 hours will result
in account suspension."

Red Flags:
• Urgency and fear tactics
• Suspicious URL
• Generic greetings
• Requests for sensitive information

Phishing Attack Variations

  • Spear Phishing: Targeted at specific individuals or organizations
  • Whaling: Targeting high-profile executives
  • Clone Phishing: Legitimate email replicated with malicious links
  • Pharming: Redirecting users to fake websites
  • Smishing: Phishing via SMS/text messages
  • Vishing: Voice phishing through phone calls

Protection Strategies:

  • Email security filters
  • User awareness training
  • URL verification
  • Multi-factor authentication
  • Regular security updates

Vishing (Voice Phishing)

Vishing: Voice-based phishing attack using phone calls to trick victims into revealing sensitive information.
Common Vishing Scenarios:

Bank Impersonation:
"Hello, this is John from your bank's fraud department.
We've detected suspicious activity on your account.
I need to verify your identity. Can you provide
your account number and PIN?"

IT Support Scam:
"This is Microsoft technical support. Your computer
has been infected with malware. Please give me
remote access to fix the problem immediately."

Government Impersonation:
"This is the IRS. You owe back taxes and face
immediate arrest unless you pay with gift cards."

Vishing Attack Techniques

Vishing Tactics:

  • Caller ID Spoofing: Displaying fake phone numbers
  • Authority Impersonation: Posing as banks, government, IT support
  • Urgency Creation: "Act now or face consequences"
  • Information Gathering: Building trust with known details
  • Emotional Manipulation: Fear, greed, or helpfulness
  • Technical Jargon: Using complex terms to sound legitimate

Vishing Prevention:

  • Never give sensitive information over unsolicited calls
  • Verify caller identity through official channels
  • Be suspicious of urgent requests
  • Use call blocking and screening
  • Report suspicious calls to authorities

Man-in-the-Middle (MitM) Attack

Man-in-the-Middle Attack: Intercepting communications between two parties without their knowledge to eavesdrop or alter messages.
MitM Attack Process:

Normal Communication:
Alice ←→ Bob

MitM Attack:
Alice ←→ Attacker ←→ Bob

1. Attacker intercepts Alice's message to Bob
2. Attacker can read, modify, or replace message
3. Attacker forwards (possibly modified) message to Bob
4. Bob's response follows same path in reverse
5. Neither Alice nor Bob knows about interception

MitM Attack Variations

  • WiFi Eavesdropping: Monitoring unencrypted WiFi traffic
  • Evil Twin: Fake WiFi access points
  • SSL Hijacking: Intercepting HTTPS connections
  • DNS Spoofing: Redirecting domain name resolutions
  • ARP Poisoning: Manipulating network routing tables
  • BGP Hijacking: Internet routing manipulation

MitM Countermeasures:

  • End-to-end encryption
  • Certificate verification
  • VPN usage on public networks
  • HTTPS enforcement
  • Network monitoring

Attack Statistics & Trends

Attack TypeSuccess RateAverage TimePrimary Target
Phishing3.4%ImmediateCredentials
Spear Phishing70%Days-WeeksSpecific targets
Brute Force5%Minutes-YearsWeak passwords
Credential Stuffing0.1-2%SecondsReused passwords
Social Engineering98%VariableHuman psychology

Comprehensive Attack Prevention

Technical Controls:

  • Multi-factor authentication
  • Account lockout policies
  • Network monitoring and filtering
  • Encryption and secure protocols
  • Regular security updates

Administrative Controls:

  • Security awareness training
  • Incident response procedures
  • Security policies and guidelines
  • Regular security assessments
  • Vendor security requirements

Emerging Attack Trends

  • AI-Powered Attacks: Machine learning for social engineering
  • Deepfake Technology: Sophisticated video/audio impersonation
  • IoT-Based Attacks: Exploiting connected devices
  • Supply Chain Attacks: Compromising third-party vendors
  • Cloud-Specific Attacks: Exploiting cloud misconfigurations
  • Mobile-First Attacks: Targeting smartphone users
  • Quantum Computing Threats: Breaking current encryption

Typical Attack Lifecycle

Cyber Kill Chain:

1. Reconnaissance: Gathering target information
2. Weaponization: Creating attack tools
3. Delivery: Transmitting weapon to target
4. Exploitation: Triggering vulnerability
5. Installation: Installing malware/backdoor
6. Command & Control: Establishing communication
7. Actions on Objective: Achieving attack goals

Defense Strategy: Break the chain at any stage

Attack Detection & Response

Detection Methods:

  • Behavioral analysis and anomaly detection
  • Network traffic monitoring
  • Log analysis and correlation
  • User activity monitoring
  • Threat intelligence integration

Response Procedures:

  • Incident identification and classification
  • Containment and isolation
  • Evidence collection and analysis
  • System recovery and restoration
  • Lessons learned and improvement

Key Takeaways

  • Attacks exploit both technical vulnerabilities and human psychology
  • Social engineering remains highly effective across all attack types
  • Prevention requires both technical and administrative controls
  • User education and awareness are critical defense components
  • Multi-layered security approach provides best protection
  • Continuous monitoring and response capabilities are essential
  • Attack methods constantly evolve with new technologies
Remember: The best defense is understanding your enemy and preparing accordingly

Thank You

Questions & Discussion

Next Unit: Network & System Security