Module 2 – Cyber Offenses
1. Definition of terminologies: (a) Hacker (b) Brute Force Hacking (c)
Cracker (d) Cracker tools (e) Phreaking (f) War dialer (g) Spamdexing.
Hacker: A hacker is person with strong interest in computers who enjoys learning and
experimenting with them. He/She is very talented, smart people who understand computer
better than the others.
Brute Force Hacking: It is a technique used to find passwords or encryption keys. It
involves trying every possible combination of letters, number, etc, until the code is broken.
Cracker: A Cracker is a person who breaks into computers. Crackers should not be
confused with hackers the term "cracker” is usually connected to computer criminals.
Crimes conducted by crackers are vandalism, theft and snooping in unauthorized areas.
Cracking: It's the act of breaking into computers. Cracking is a popular growing subject on
the internet. There are websites supplying crackers with programs that allows them to crack
computers (like guessing passwords); they used to break phone line (phreaking). These files
display warnings such as "These files are illegal; we are not responsible for what you do
with them”
Cracker tools: These are programs that’ break into computer. These are widely distributed
on the internet. Like password crackers, Trojans, Viruses, war dialers and worms.
Phreaking: This is notorious art of breaking into phone or other communication systems.
War dialer: It is program that automatically dials phone numbers looking for computers on
the other end. It catalogs numbers so that the hackers can call back and try to break in.
Spamdexing: Search engine spam or Spamdexing is an attempt to manipulate search engine
rankings and generate traffic using repeated unrelated phrases, spammy links, spammy
keywords, spammy post & pages, etc by cyber criminals.
2. Differences between passive and active attacks provide tools as example.
Active attacks Passive attacks
Basic Type of attack in which the Type of attack where the attacker
attacker tries to modify tries to read/monitor or make use of
information or disrupt the system information from the system without
or network’s functioning by modifying any information
injecting malicious traffic or
, M2: Cyber Offenses BETCK105I Dr. Srilakshmi Prabhu
executing unauthorized
commands
Intent Compromise in data integrity, Gaining unauthorized access to
reduce the availability of system sensitive or confidential data or
resources, financial loss for the information without being detected
targeted organization
Mode of contact Attacker directly communicates Attacker is in indirect contact with
with the target system or network the target system or network
Modification in Occurs Doesn’t take place
information/data
Harm to system Always causes damage to system Doest not cause any harm
or network
Search for Does not check for loopholes or It scans the port and network in
loopholes and vulnerabilities search for loop holes and
vulnerabilities vulnerabilities
Threat to It is a threat to the integrity and It is a threat to data confidentiality
availability of the data
Attack Victim is aware of the attack Victim is unaware of the attack
awareness
Task performed Accomplished by gaining the Attacker just needs to observe the
by the attacker physical control over the transmission
communication link to capture and
insert transmission
Examples Masquerade attack, Replay attack, Release of message content, Traffic
Denial of Service, Session analysis, network mapping, sniffing,
hijacking dumpster diving