Zero-day attack is the attack which is done through by vulnerable . In this process hackers attack through find a vulnerable in your system or program .
WHO CARRIED ZERO-DAY ATTACK ??
Hacktivist : – Hackers motivated by political or social cause which is motivated them and they prefer their attack .
Cybercriminals:- Hackers who done hacks based on only financial gain.
Cyberwarfare : – Politicians or business person use this attack and their purpose to harm other business person or politicians to other state.
HOW TO YOU PRETEND YOURSELF FROM ZERO-DAY ATTACKS ??
THERE ARE NO WAYS TO PROTECT YOURSELF FROM ZERO-DAY ATTACKS BUT SOME WAY THAT FOLLOW YOU AND PRETEND YOURSELF FROM THESE ATTACKS : –
Keep your system updated : which software you use or your company used keep updated information.
A cryptocurrency is a form of digital asset based on a network that is distributed across a large number of computers. This decentralized structure allows them to exist outside the control of governments and central authorities.
The word “cryptocurrency” is derived from the encryption techniques which are used to secure the network.
Blockchains, which are organizational methods for ensuring the integrity of transactional data, are an essential component of many cryptocurrencies.
Many experts believe that blockchain and related technology will disrupt many industries, including finance and law.
A ransomwareattack on JBS, the world’s largest meat supplier, has been linked to a criminal organization based out of Russia, according to the US government.
The company, which is headquartered in Brazil and operates worldwide through various subsidiaries, annonced on monday(May 31) that its North American and Australian systems had been the victim of a cyber-attack.
According to reuters, the FBI is now conducting an investigation into the claims that the attackers emerged from Russia.
The incident caused operations in both theUS and Australia to be temporarily suspended. The company’s website is also still currently offline at the time of writing.
‘No evidence’ of data breach
JBS said that there is “no evidence” that any customer or supplier data has been compromised as a result of the ransomware attack.
The company said on discovering the attack it suspended IT systems, notified authorities, and is now working to restore systems from a backup with the help of third-party services.
It did not confirm whether or not it had paid the ransom demand.
Andre Nogueira, chief executive of JBS USA, was quoted as saying: “Our systems are coming back online and we are not sparing any resources to fight this threat.”
Stuart Reed, UK director at incident response firm Orange Cyberdefense, told The Daily Swig that this attack is a “stark reminder of the devastation that can be caused” by ransomware attacks.
Reed commented: “With global supermarkets and some of the world’s largest corporations set to bear the brunt of the disruption caused by the incident, we are reminded of the importance of having a swift response strategy in place to minimize damage, not just within the business, but throughout the entire supply chain.
The purpose of penetration testing is to detect security weaknesses and issues. This testing can also be used to test an organization’s security policy, its attachment to compliance requirements, its employee’s security awareness, and the company’s capability to pick up and react to security incidents. The final goal is to detect security problems and vulnerabilities. In addition, we have many side goals that Pen testing activities can do:
Test the compliance of security policies.
Verify the awareness of the staff in terms of security.
Check if and how an organization can face a security breach.
Penetration Testing Strategic Approaches
There are a few ways where cybersecurity experts can take while executing a penetration test. The key difference tells how much knowledge that the theoretical attacker thinks to have.
1. Gray Box Penetration Test
This type of penetration testing will have the tester possess some basic knowledge about the system. It could be initial credentials, a network infrastructure map, or application logic flow charts. The test will give away a very realistic outcome because many cyber attackers will not even attempt to attack without a small amount of information about the target. This way essentially skips over the “reconnaissance” step and first gets to the actual pen test. It can be done more quickly and focus exactly on systems that are already known to be risky.
2. Black Box Penetration Test
This type of test was performed without any idea of the earmarked network or the systems running on it. The tester does not have any idea about the internal code or software and has no access to any credentials or sensitive data. This form of testing is realistic because it enables the tester to think like a potential hacker when searching for vulnerabilities. While it may seem like the exact form of testing, black box tests are restricted by time limits. The tester usually has a certain time to check on the system and try to earn access, while a hacker does not have similar restrictions and could detect weaknesses that are not obvious.
TYPES OF PENTRATION TEST :–
1. Network Penetration Test
In a network penetration test, you would be testing a network environment for potential security vulnerabilities and threats. This test was divided into two categories: external and internal penetration tests. An external penetration test would involve testing the public IP addresses, whereas, in an internal test, you can become part of an internal network and test that network.
The test generally aims at the following network areas in their penetration tests.
Firewall configuration
Firewall bypass testing
Stateful analysis testing.
IPS deception
DNS level attacks
2. Web application penetration test
A web application penetration testing examines the potential security problems or problems that occurred due to insecure design, development, or coding. This test detects the potential vulnerabilities in the websites and web applications with CRN and externally or internally developed programs, leading to exposing or leaking important data and personal confidential data. This test is designed to focus mainly on browsers, websites and web applications, and other components like plug-in, procedures, Applets, etc.
3. Client-side test
The client-side test can also be called an internal test run to identify potential security threats that could emerge from within the organization. It could be a disadvantage in software applications running in the user’s workplace where a hacker can easily utilize it. The theme of utilizing can be exploiting vulnerabilities in client-side applications like through emails, web browsers, Macromedia Flash, Adobe Acrobat, and other modes. A hacker can use a vulnerable application through a smartly crafted email or by attracting the employee to visit a malicious web page or by malware loaded on USB sticks that are automatically executed once kept in the user’s workplace. Though running the client-side test can identify the disadvantages and reduce data breach and system vulnerability.
4. Wireless network test
Wireless network test is about dealing with wireless devices like tablets, laptops, notebooks, iPods drives, smartphones, etc. As the name itself says that the test has to examine all the wireless devices to detect any security loopholes and identify the devices that are deemed to be weak or rogue. Besides the gadgets, the penetration test considers testing administration credentials to determine crossing
A cyber attack is any attempt to gain unauthorized access to a computer, computer network or computing system with intent to cause damage . Cyber attacks aims to disable, currupt , or control computer system or to alter block , delete and steal the data held within these system .
TYPES OF CYBER ATTACK : –
MALWARE
PHISHING ATTACK
ZERO-DAY EXPLOIT
SPAM
RANSOMWARE
BOTNET
DOS
DDOS
ZOMBIES
Mostly cyber attacks is preferred through emails , called spam . Which is intentionally done by black hat hacker , called scammer . But not only for bad hacking is done for good purpos which is done by white hat hacker ir penetration tester they exploit bug companies data and find vulnerabilities on their site and inform them and the company give them money for finds vulnerable on their site, actually they called also bug bounter and recently google give 75 lakh for find a exploit on their site for bug bounter . Bug bounter also called white hat hacker .
If you wanted to private your data follow password manager
A long , complex password is very secure digital protection everyone must have however , creating a long , complex password that you will recall easily every time you need it is not an easy task for most of us . But this challenge should not let you compromise on the security of your online accounts . An immediate solution for this is using password manager . Password managers use encryption to protect your password .
AES-256 but is the industry that is also used by military , because of its exceptional strength , it would take more than a lifetime to crack this cipher , so a brute force attack near zero chance to success . It is recommended also two factor authentication , such as finger print and face scan is also a good idea .
Risk of using password manager : —
ALL YOUR DATA IN ONE PLACE :- In case of a breach , blocking all payments options and changing passwords for all account might be take enough time for the attacker to do damage .
DATA BACKUP IS NOT POSSIBLE
NOT ALL DEVICES ARE SECURE ENOUGH
BAD PADSWORD MANAGER
FORGETTING YOUR PASSWORD MANAGER
CAN PASSWORD MANAGER BE TRUSTED??
Yes , because its usage 2FA process , and mostly depend if u are created a strong password which is beyond to guessing including (symbol, number, uppercase , lowercase) etc .
Mc Donald’s become has the latest company to be hit by a data breach after unauthorized activity on its network to personal data of some customers in South Korea and Taiwaan McDonald’s Corp said that it quickly identified and contained the incident amd that the through investigation was done .
“While we are able to close off access quickly after identification . our investigation has determined only some small files were accessed , some of which contained personal data ,” the burger chain said .
McDonald’s said its investigation only taiwaan and Korea network personal data breaches . And that they would be taking steps to notify regulators and also the customers who may be impacted . No customer payments formaction was exposed .
Mc’s Donald said it will look at the investigation finding , coupled with input from security resources to identify way to further enhance its security measure .
Businesses are more targeted by cybercriminals , including very high profile cyber attacks cases in recent weeks , ex : colonial pipeline , jbs chicken company etc.
PASSWORD ARE LIKE UNDERWEAR , DON’T LET PEOPLE SEE IT , CHANGE IT WITH VERY OFTEN AND YOU SHOULD’T SHARE WITH IT STRANGERS.
Man in the middle is a type of cyberattack where the hackers relays and secretly enters two parties communication who believes they connect directly . Ex : evasdropping
HOW DO PREVENT MAN IN THE MIDDLE ATTACK ??
Use a VPN to encrypt your web traffic , an encrypted traffic VPN severely limit’s a hacker ability to read or modify web traffic , be prepared to prevent data loss , have a cyber security incident response plan .
WHAT TYPES OF ATTACKS DO HACKERS USE FREE WIFI ??
When attempting to use public free wifi, you may be at risk of joining a rogue wifi hotspot. In such cases a hackers creates a fake hotspot with the intent to perform man – in- the middle attack .
Anonymous is a decentralized international hactivist whose are known by its various cyber attacks against government institutions, agencies and church of scientology..
Anonymous website name is wikileagues and this is the site they put their rights , public problems because the anonymous mainly anthem is
We are anonymous
We do not forgive
We do not forget
We are legion
Nothing is scared
The mean is in the world nothing is hidden all your activity hackers see . They wanted anybody put their thoughts , problems against government...
Anonymous originated in 2003, the anonymous word comes from anonymity means (any person is free to put anything on social media publicly with indepandently) . Nobody is head in this group anybody will be a hacker in this group , actually at starting this group purpose for public rights , but in this group some persons doing something craziness for public harassment then they black spot on this group but at last this group existed that guys then this guys called lulz group .
Actually anonymous put on social media that things which is hidden by governments , big companies related to public harassment …
Example::-
Jio company blames by hackers because the normal indian public data sell in China
At present , Elon musk warns by hackers
Wikileaks is originated in 2006 by julian Assange a programmer..
This attack based on trial-and-error to guess login info,encryption keys or find a hidden web page , Hackers work through all possible combinations hoping to guess correctly .
WHAT IS HACKERS GAIN FROM BRUTE FORCE ATTACK??
Profiting from ads and collection your data
Stealing personal data
Hijacking your site from malicious a activity
Running a website reputation
Types of Brute-Force attack??
Simple BRUTE-FORCE attack
Dictionary attack
Hybrid BRUTE-FORCE attack
Reverse brute-force attack
Credential stuffing
How to protect yourself from Brute-force attack??
Use different password for any sites
Use a unique and strong password
Use a password manager
Use that type password which is not guessed by anyone
Is BRUTE-FORCE attack legal??
No , this is not legal but if you are a penetration tester and u have permission to do then this is legal..